Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- * ID: 2352
- * MalFamily: ""
- * MalScore: 10.0
- * File Name: "CO4164755428077540939.vbs"
- * File Size: 4288220
- * File Type: "ASCII text, with very long lines, with no line terminators"
- * SHA256: "d6e36ec54c6978aef9c69feb23bdc7b7eb12606b13148884cfaf78dd6b2b84ee"
- * MD5: "d36d03e30c3af1c831f527b8dbafb521"
- * SHA1: "2975f4b057640e1f5cdce6bd3792cecc9c99afe1"
- * SHA512: "f0bf4f60106436939fe56cf99252c5d10e45fd039eed46c24e4be85fcf83592b3891c34670bb373a8dbd37d98307d32dffec10c2d576a70eae9254cb87ce0dd1"
- * CRC32: "97BDC409"
- * SSDEEP: "49152:sT682RzSu5kyBEWijKFabBJLaLDrET3VkpIzYN0bjjVyb0LuyOkX8LFMmleiF+XX:Y"
- * Process Execution:
- "wscript.exe",
- "svchost.exe",
- "WmiPrvSE.exe",
- "svchost.exe",
- "taskeng.exe",
- "taskeng.exe",
- "msoia.exe",
- "msoia.exe",
- "WMIADAP.exe",
- "taskeng.exe",
- "taskeng.exe"
- * Executed Commands:
- "taskeng.exe F084B693-0906-43C1-B1D4-1E4ECE18A120 S-1-5-18:NT AUTHORITY\\System:Service:",
- "taskeng.exe 67189A3A-E994-4CA2-80F0-B208B1BF10B1 S-1-5-21-0000000000-0000000000-0000000000-1000:Host\\user:Interactive:1",
- "\\\\?\\C:\\Windows\\system32\\wbem\\WMIADAP.EXE wmiadap.exe /F /T /R",
- "taskeng.exe 1C78870B-530F-41A4-A2CD-39CC33DFD884 S-1-5-18:NT AUTHORITY\\System:Service:",
- "taskeng.exe ECBAC3F6-CF16-4D7F-9CCD-B5D5824740E4 S-1-5-18:NT AUTHORITY\\System:Service:",
- "\"C:\\Program Files\\Common Files\\Microsoft Shared\\Office15\\OLicenseHeartbeat.exe\"",
- "\"C:\\Program Files\\Microsoft Office\\Office15\\msoia.exe\" scan upload mininterval:2880",
- "\"C:\\Program Files\\Microsoft Office\\Office15\\msoia.exe\" scan upload"
- * Signatures Detected:
- "Description": "SetUnhandledExceptionFilter detected (possible anti-debug)",
- "Details":
- "Description": "Guard pages use detected - possible anti-debugging.",
- "Details":
- "Description": "A process attempted to delay the analysis task.",
- "Details":
- "Process": "wscript.exe tried to sleep 360 seconds, actually delayed analysis time by 0 seconds"
- "Process": "WmiPrvSE.exe tried to sleep 601 seconds, actually delayed analysis time by 0 seconds"
- "Process": "taskeng.exe tried to sleep 438 seconds, actually delayed analysis time by 0 seconds"
- "Process": "svchost.exe tried to sleep 367 seconds, actually delayed analysis time by 0 seconds"
- "Description": "A process created a hidden window",
- "Details":
- "Process": "svchost.exe -> \\\\?\\C:\\Windows\\system32\\wbem\\WMIADAP.EXE"
- "Description": "Uses Windows utilities for basic functionality",
- "Details":
- "command": "\"C:\\Program Files\\Common Files\\Microsoft Shared\\Office15\\OLicenseHeartbeat.exe\""
- "Description": "Behavioural detection: Transacted Hollowing",
- "Details":
- "Description": "Stack pivoting was detected when using a critical API",
- "Details":
- "process": "taskeng.exe:2604"
- "process": "WmiPrvSE.exe:2868"
- "process": "taskeng.exe:4028"
- "Description": "Checks the CPU name from registry, possibly for anti-virtualization",
- "Details":
- "Description": "Attempts to interact with an Alternate Data Stream (ADS)",
- "Details":
- "file": "C:\\$Extend\\$Quota:$Q:$INDEX_ALLOCATION"
- * Started Service:
- * Mutexes:
- "CicLoadWinStaWinSta0",
- "Local\\MSCTF.CtfMonitorInstMutexDefault1",
- "DSKQUOTA_SIDCACHE_MUTEX",
- "Global\\ADAP_WMI_ENTRY",
- "Global\\RefreshRA_Mutex",
- "Global\\RefreshRA_Mutex_Lib",
- "Global\\RefreshRA_Mutex_Flag"
- * Modified Files:
- "C:\\Users\\user\\AppData\\Local\\Temp\\usrEEpqjQ",
- "\\??\\PIPE\\srvsvc",
- "\\Device\\LanmanDatagramReceiver",
- "C:\\Windows\\SoftwareDistribution\\DataStore\\DataStore.edb",
- "C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\edb.chk",
- "\\??\\pipe\\PIPE_EVENTROOT\\CIMV2PROVIDERSUBSYSTEM",
- "\\??\\WMIDataDevice",
- "\\??\\PIPE\\lsarpc",
- "C:\\$Extend\\$Quota:$Q:$INDEX_ALLOCATION"
- * Deleted Files:
- "C:\\Windows\\sysnative\\Tasks\\Microsoft\\Windows Defender\\MpIdleTask",
- "C:\\Windows\\sysnative\\Tasks\\Microsoft\\Windows Defender\\MP Scheduled Scan",
- "C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\edbtmp.log"
- * Modified Registry Keys:
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\2F377986-27CA-4BB8-BABF-CF61DD96452C\\Path",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\2F377986-27CA-4BB8-BABF-CF61DD96452C\\Hash",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tree\\Microsoft\\Windows Defender\\MP Scheduled Scan\\Id",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tree\\Microsoft\\Windows Defender\\MP Scheduled Scan\\Index",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\2F377986-27CA-4BB8-BABF-CF61DD96452C\\Triggers",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\2F377986-27CA-4BB8-BABF-CF61DD96452C\\DynamicInfo",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\ED0D73D7-BC97-46E2-AC55-FD6EB3F72C05\\DynamicInfo",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\F084B693-0906-43C1-B1D4-1E4ECE18A120",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\B17E070E-57E3-43F6-96F5-A9A9C921DEBF\\DynamicInfo",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\67189A3A-E994-4CA2-80F0-B208B1BF10B1",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\DF000DCA-3FA2-48A6-9E59-C0606F9F8D73\\DynamicInfo",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\1C78870B-530F-41A4-A2CD-39CC33DFD884",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\ECBAC3F6-CF16-4D7F-9CCD-B5D5824740E4",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\F084B693-0906-43C1-B1D4-1E4ECE18A120\\data",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\67189A3A-E994-4CA2-80F0-B208B1BF10B1\\data",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\1C78870B-530F-41A4-A2CD-39CC33DFD884\\data",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\ECBAC3F6-CF16-4D7F-9CCD-B5D5824740E4\\data"
- * Deleted Registry Keys:
- * DNS Communications:
- * Domains:
- * Network Communication - ICMP:
- * Network Communication - HTTP:
- * Network Communication - SMTP:
- * Network Communication - Hosts:
- * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement