Advertisement
paladin316

Exes_bb0b4aadbefc8b33abf8d242527332b9_jpg_2019-07-17_19_30.txt

Jul 17th, 2019
1,396
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 14.70 KB | None | 0 0
  1.  
  2. * MalFamily: "bb0b4aadbefc8b33abf8d242527332b9"
  3.  
  4. * MalScore: 10.0
  5.  
  6. * File Name: "Exes_bb0b4aadbefc8b33abf8d242527332b9.jpg"
  7. * File Size: 850431
  8. * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows, RAR self-extracting archive"
  9. * SHA256: "6a534a101ea2e6fee398e29fa11e9c254d78d8bcf40d2bb445307a18ab5dca6f"
  10. * MD5: "bb0b4aadbefc8b33abf8d242527332b9"
  11. * SHA1: "582d53129eaec516ac5c55198ee12149fa6cc26a"
  12. * SHA512: "6f402f36daea95505d147dbdd6da8ece620fd15c6a28d490a29437a538f15fe1607e2e929774ef8f188e9ae75120435d2cfebd5db2029e021a40f8c5cbc8318a"
  13. * CRC32: "8C83D2AE"
  14. * SSDEEP: "24576:b2O/Gl+2MnqDPvvJZnFSjwmxhKbH3rUO46GUx:KMqDPv3FOwmxUT3icx"
  15.  
  16. * Process Execution:
  17. "Exes_bb0b4aadbefc8b33abf8d242527332b9.jpg",
  18. "tcw.exe",
  19. "tcw.exe",
  20. "RegSvcs.exe"
  21.  
  22.  
  23. * Executed Commands:
  24. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\tcw.exe hvq=mjq"
  25.  
  26.  
  27. * Signatures Detected:
  28.  
  29. "Description": "Attempts to connect to a dead IP:Port (2 unique times)",
  30. "Details":
  31.  
  32. "IP": "185.247.228.54:3999"
  33.  
  34.  
  35. "IP": "185.165.153.222:3999"
  36.  
  37.  
  38.  
  39.  
  40. "Description": "Creates RWX memory",
  41. "Details":
  42.  
  43.  
  44. "Description": "A process attempted to delay the analysis task.",
  45. "Details":
  46.  
  47. "Process": "RegSvcs.exe tried to sleep 900 seconds, actually delayed analysis time by 0 seconds"
  48.  
  49.  
  50.  
  51.  
  52. "Description": "Reads data out of its own binary image",
  53. "Details":
  54.  
  55. "self_read": "process: Exes_bb0b4aadbefc8b33abf8d242527332b9.jpg, pid: 2296, offset: 0x00000000, length: 0x00000007"
  56.  
  57.  
  58. "self_read": "process: Exes_bb0b4aadbefc8b33abf8d242527332b9.jpg, pid: 2296, offset: 0x00000000, length: 0x00002000"
  59.  
  60.  
  61. "self_read": "process: Exes_bb0b4aadbefc8b33abf8d242527332b9.jpg, pid: 2296, offset: 0x00000007, length: 0x000cf9f8"
  62.  
  63.  
  64. "self_read": "process: Exes_bb0b4aadbefc8b33abf8d242527332b9.jpg, pid: 2296, offset: 0x00001ff0, length: 0x00002000"
  65.  
  66.  
  67. "self_read": "process: Exes_bb0b4aadbefc8b33abf8d242527332b9.jpg, pid: 2296, offset: 0x00003fe0, length: 0x00002000"
  68.  
  69.  
  70. "self_read": "process: Exes_bb0b4aadbefc8b33abf8d242527332b9.jpg, pid: 2296, offset: 0x00005fd0, length: 0x00002000"
  71.  
  72.  
  73. "self_read": "process: Exes_bb0b4aadbefc8b33abf8d242527332b9.jpg, pid: 2296, offset: 0x00007fc0, length: 0x00002000"
  74.  
  75.  
  76. "self_read": "process: Exes_bb0b4aadbefc8b33abf8d242527332b9.jpg, pid: 2296, offset: 0x00009fb0, length: 0x00002000"
  77.  
  78.  
  79. "self_read": "process: Exes_bb0b4aadbefc8b33abf8d242527332b9.jpg, pid: 2296, offset: 0x0000bfa0, length: 0x00002000"
  80.  
  81.  
  82. "self_read": "process: Exes_bb0b4aadbefc8b33abf8d242527332b9.jpg, pid: 2296, offset: 0x0000df90, length: 0x00002000"
  83.  
  84.  
  85. "self_read": "process: Exes_bb0b4aadbefc8b33abf8d242527332b9.jpg, pid: 2296, offset: 0x0000ff80, length: 0x00002000"
  86.  
  87.  
  88. "self_read": "process: Exes_bb0b4aadbefc8b33abf8d242527332b9.jpg, pid: 2296, offset: 0x00011f70, length: 0x00002000"
  89.  
  90.  
  91. "self_read": "process: Exes_bb0b4aadbefc8b33abf8d242527332b9.jpg, pid: 2296, offset: 0x00013f60, length: 0x00002000"
  92.  
  93.  
  94. "self_read": "process: Exes_bb0b4aadbefc8b33abf8d242527332b9.jpg, pid: 2296, offset: 0x00015f50, length: 0x00002000"
  95.  
  96.  
  97. "self_read": "process: Exes_bb0b4aadbefc8b33abf8d242527332b9.jpg, pid: 2296, offset: 0x00017f40, length: 0x00002000"
  98.  
  99.  
  100. "self_read": "process: Exes_bb0b4aadbefc8b33abf8d242527332b9.jpg, pid: 2296, offset: 0x00019f30, length: 0x00002000"
  101.  
  102.  
  103. "self_read": "process: Exes_bb0b4aadbefc8b33abf8d242527332b9.jpg, pid: 2296, offset: 0x0001bf20, length: 0x00002000"
  104.  
  105.  
  106. "self_read": "process: Exes_bb0b4aadbefc8b33abf8d242527332b9.jpg, pid: 2296, offset: 0x0001df10, length: 0x00002000"
  107.  
  108.  
  109. "self_read": "process: Exes_bb0b4aadbefc8b33abf8d242527332b9.jpg, pid: 2296, offset: 0x0001ff00, length: 0x00002000"
  110.  
  111.  
  112. "self_read": "process: Exes_bb0b4aadbefc8b33abf8d242527332b9.jpg, pid: 2296, offset: 0x00021000, length: 0x00000037"
  113.  
  114.  
  115. "self_read": "process: Exes_bb0b4aadbefc8b33abf8d242527332b9.jpg, pid: 2296, offset: 0x00021014, length: 0x000ae9e4"
  116.  
  117.  
  118.  
  119.  
  120. "Description": "Drops a binary and executes it",
  121. "Details":
  122.  
  123. "binary": "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\tcw.exe"
  124.  
  125.  
  126.  
  127.  
  128. "Description": "Executed a process and injected code into it, probably while unpacking",
  129. "Details":
  130.  
  131. "Injection": "tcw.exe(1772) -> RegSvcs.exe(2684)"
  132.  
  133.  
  134.  
  135.  
  136. "Description": "Installs itself for autorun at Windows startup",
  137. "Details":
  138.  
  139. "key": "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Run\\desktop"
  140.  
  141.  
  142. "data": "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\tcw.exe C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\HVQ_MJ~1"
  143.  
  144.  
  145.  
  146.  
  147. "Description": "Creates a hidden or system file",
  148. "Details":
  149.  
  150. "file": "C:\\Users\\user\\AppData\\Local\\Temp\\62834225"
  151.  
  152.  
  153.  
  154.  
  155. "Description": "File has been identified by 50 Antiviruses on VirusTotal as malicious",
  156. "Details":
  157.  
  158. "MicroWorld-eScan": "Trojan.GenericKD.31913316"
  159.  
  160.  
  161. "FireEye": "Generic.mg.bb0b4aadbefc8b33"
  162.  
  163.  
  164. "CAT-QuickHeal": "Trojan.Generic"
  165.  
  166.  
  167. "McAfee": "Artemis!BB0B4AADBEFC"
  168.  
  169.  
  170. "Alibaba": "Trojan:Win32/Starter.ali2000005"
  171.  
  172.  
  173. "K7GW": "Trojan ( 0054b2471 )"
  174.  
  175.  
  176. "K7AntiVirus": "Trojan ( 0054b2471 )"
  177.  
  178.  
  179. "Invincea": "heuristic"
  180.  
  181.  
  182. "Symantec": "Trojan.Gen.MBT"
  183.  
  184.  
  185. "APEX": "Malicious"
  186.  
  187.  
  188. "Paloalto": "generic.ml"
  189.  
  190.  
  191. "ClamAV": "Win.Trojan.Autoit-6870735-0"
  192.  
  193.  
  194. "Kaspersky": "HEUR:Trojan.Win32.Generic"
  195.  
  196.  
  197. "BitDefender": "Trojan.GenericKD.31913316"
  198.  
  199.  
  200. "NANO-Antivirus": "Trojan.Win32.AutoIt.fpjrzy"
  201.  
  202.  
  203. "Avast": "Win32:Trojan-gen"
  204.  
  205.  
  206. "Tencent": "Win32.Trojan.Generic.Pepn"
  207.  
  208.  
  209. "Endgame": "malicious (high confidence)"
  210.  
  211.  
  212. "Sophos": "Mal/Generic-S"
  213.  
  214.  
  215. "Comodo": "Malware@#3k5odn2jm49eq"
  216.  
  217.  
  218. "F-Secure": "Dropper.DR/AutoIt.Gen"
  219.  
  220.  
  221. "DrWeb": "Trojan.DownLoader27.57696"
  222.  
  223.  
  224. "VIPRE": "Trojan.Win32.Generic!BT"
  225.  
  226.  
  227. "TrendMicro": "TROJ_GEN.R002C0PDN19"
  228.  
  229.  
  230. "McAfee-GW-Edition": "BehavesLike.Win32.Backdoor.cc"
  231.  
  232.  
  233. "Fortinet": "AutoIt/Agent.DRKP!tr"
  234.  
  235.  
  236. "Trapmine": "malicious.high.ml.score"
  237.  
  238.  
  239. "Emsisoft": "Trojan.GenericKD.31913316 (B)"
  240.  
  241.  
  242. "Cyren": "W32/Trojan.GEFL-7635"
  243.  
  244.  
  245. "Jiangmin": "Trojan.Miner.ffr"
  246.  
  247.  
  248. "Avira": "DR/AutoIt.Gen"
  249.  
  250.  
  251. "MAX": "malware (ai score=99)"
  252.  
  253.  
  254. "Microsoft": "Trojan:Win32/Skeeyah.A!bit"
  255.  
  256.  
  257. "Arcabit": "Trojan.Generic.D1E6F564"
  258.  
  259.  
  260. "ZoneAlarm": "HEUR:Trojan.Win32.Generic"
  261.  
  262.  
  263. "GData": "Trojan.GenericKD.31913316"
  264.  
  265.  
  266. "AhnLab-V3": "Trojan/Win32.Autoit.C1942121"
  267.  
  268.  
  269. "Acronis": "suspicious"
  270.  
  271.  
  272. "ALYac": "Trojan.GenericKD.31913316"
  273.  
  274.  
  275. "Cylance": "Unsafe"
  276.  
  277.  
  278. "Zoner": "Probably RARAutorun"
  279.  
  280.  
  281. "ESET-NOD32": "Win32/Injector.Autoit.DXJ"
  282.  
  283.  
  284. "TrendMicro-HouseCall": "TROJ_GEN.R002C0PDN19"
  285.  
  286.  
  287. "Rising": "Trojan.Injector!8.C4 (TOPIS:E0:it1Wp5KbcYC)"
  288.  
  289.  
  290. "Ikarus": "Trojan.Win32.Injector"
  291.  
  292.  
  293. "Ad-Aware": "Trojan.GenericKD.31913316"
  294.  
  295.  
  296. "AVG": "Win32:Trojan-gen"
  297.  
  298.  
  299. "Cybereason": "malicious.dbefc8"
  300.  
  301.  
  302. "CrowdStrike": "win/malicious_confidence_60% (W)"
  303.  
  304.  
  305. "Qihoo-360": "HEUR/QVM06.3.CAC5.Malware.Gen"
  306.  
  307.  
  308.  
  309.  
  310. "Description": "Clamav Hits in Target/Dropped/SuriExtracted",
  311. "Details":
  312.  
  313. "target": "clamav:Win.Trojan.Autoit-6870735-0, sha256:6a534a101ea2e6fee398e29fa11e9c254d78d8bcf40d2bb445307a18ab5dca6f, type:PE32 executable (GUI) Intel 80386, for MS Windows, RAR self-extracting archive"
  314.  
  315.  
  316.  
  317.  
  318. "Description": "Created network traffic indicative of malicious activity",
  319. "Details":
  320.  
  321. "signature": "ET DNS Query to a .tk domain - Likely Hostile"
  322.  
  323.  
  324.  
  325.  
  326.  
  327. * Started Service:
  328.  
  329. * Mutexes:
  330. "DefaultTabtip-MainUI",
  331. "CicLoadWinStaWinSta0",
  332. "Local\\MSCTF.CtfMonitorInstMutexDefault1",
  333. "-"
  334.  
  335.  
  336. * Modified Files:
  337. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\__tmp_rar_sfx_access_check_23103765",
  338. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\djd.docx",
  339. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\hvq=mjq",
  340. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\FileConstants.bmp",
  341. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\ToolTipConstants.jpg",
  342. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\tcw.exe",
  343. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\qps.ico",
  344. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\ncb.mp4",
  345. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\jnn.xl",
  346. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\aou.xl",
  347. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\vch.jpg",
  348. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\aqo.docx",
  349. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\dfp.ppt",
  350. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\vsh.ppt",
  351. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\cpw.xl",
  352. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\svh.mp4",
  353. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\nsn.jpg",
  354. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\mss.txt",
  355. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\jka.icm",
  356. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\kcv.mp3",
  357. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\qqc.txt",
  358. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\jvr.bmp",
  359. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\elb.pdf",
  360. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\ofp.jpg",
  361. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\bvp.txt",
  362. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\oio.txt",
  363. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\ogq.ico",
  364. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\nwd.pdf",
  365. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\sta.jpg",
  366. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\stq.xl",
  367. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\pac.bmp",
  368. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\duu.icm",
  369. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\gvj.mp4",
  370. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\evv.icm",
  371. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\bdc.mp4",
  372. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\qwh.mp3",
  373. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\mix.ppt",
  374. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\tou.bmp",
  375. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\els.txt",
  376. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\atf.ppt",
  377. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\wkm.jpg",
  378. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\flj.docx",
  379. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\ptk.dat",
  380. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\eov.ppt",
  381. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\wtw.ppt",
  382. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\tse.bmp",
  383. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\bfc.txt",
  384. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\vno.bmp",
  385. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\vev.mp4"
  386.  
  387.  
  388. * Deleted Files:
  389. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\__tmp_rar_sfx_access_check_23103765",
  390. "C:\\Users\\user\\AppData\\Local\\Temp\\62834225\\PQLPT"
  391.  
  392.  
  393. * Modified Registry Keys:
  394. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Run\\desktop"
  395.  
  396.  
  397. * Deleted Registry Keys:
  398.  
  399. * DNS Communications:
  400.  
  401. "type": "A",
  402. "request": "tojah77.duckdns.org",
  403. "answers":
  404.  
  405. "data": "185.247.228.54",
  406. "type": "A"
  407.  
  408.  
  409.  
  410.  
  411. "type": "A",
  412. "request": "femolampa2.tk",
  413. "answers":
  414.  
  415. "data": "185.165.153.222",
  416. "type": "A"
  417.  
  418.  
  419.  
  420.  
  421.  
  422. * Domains:
  423.  
  424. "ip": "185.247.228.54",
  425. "domain": "tojah77.duckdns.org"
  426.  
  427.  
  428. "ip": "185.165.153.222",
  429. "domain": "femolampa2.tk"
  430.  
  431.  
  432.  
  433. * Network Communication - ICMP:
  434.  
  435. * Network Communication - HTTP:
  436.  
  437. * Network Communication - SMTP:
  438.  
  439. * Network Communication - Hosts:
  440.  
  441. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement