Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- * MalFamily: "AutoIT"
- * MalScore: 10.0
- * File Name: "Exes_b387816ee869fe5a8cfcd6ef4dd46c23.exe"
- * File Size: 805888
- * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed"
- * SHA256: "a402b91d84f226b0cbbe9c5f4fd8e079ace27a8dc66047d6e10685462e2b26bf"
- * MD5: "b387816ee869fe5a8cfcd6ef4dd46c23"
- * SHA1: "1c2cbe88597f8b0893abfc2e11c63e8d56bb75a4"
- * SHA512: "cb4e2a5482455a3033a43dc319dd1771b88e31c071729bfa1ede057326a09ff308daf0b1a7e4c0a64327c617473efbaa1758686ea0be19315925ae793b133808"
- * CRC32: "47BBBFB1"
- * SSDEEP: "12288:gXe9PPlowWX0t6mOQwg1Qd15CcYk0We1HJkeJ8fer6tgEyU9jSXdzFBEmzha9MR2:9hloDX0XOf4seWfZtgEohMMRC/B"
- * Process Execution:
- "tslCJf.exe",
- "cmd.exe",
- "schtasks.exe",
- "wscript.exe",
- "svchost.exe",
- "WmiPrvSE.exe",
- "explorer.exe",
- "cmd.exe",
- "svchost.exe",
- "taskeng.exe",
- "taskeng.exe",
- "msoia.exe",
- "msoia.exe",
- "taskeng.exe",
- "taskeng.exe",
- "WMIADAP.exe",
- "taskhost.exe"
- * Executed Commands:
- "C:\\Windows\\system32\\cmd.exe /c schtasks /create /tn GCWGGK.exe /tr C:\\Users\\user\\AppData\\Roaming\\Windata\\wintaskhost.exe /sc minute /mo 1",
- "WSCript C:\\Users\\user\\AppData\\Local\\Temp\\GCWGGK.vbs",
- "C:\\Windows\\system32\\wbem\\wmiprvse.exe -secured -Embedding",
- "C:\\Windows\\system32\\DllHost.exe /Processid:AB8902B4-09CA-4BB6-B78D-A8F59079A8D5",
- "schtasks /create /tn GCWGGK.exe /tr C:\\Users\\user\\AppData\\Roaming\\Windata\\wintaskhost.exe /sc minute /mo 1",
- "\"C:\\Users\\user\\AppData\\Local\\Temp\\tslCJf.exe\"",
- "C:\\Users\\user\\AppData\\Local\\Temp\\tslCJf.exe ",
- "taskeng.exe FEB62FD4-1C1D-45E8-946A-9AA5085B45BB S-1-5-18:NT AUTHORITY\\System:Service:",
- "taskeng.exe C34C0583-B73E-4BF1-AA7F-CD741EFE824D S-1-5-21-0000000000-0000000000-0000000000-1000:Host\\user:Interactive:1",
- "taskeng.exe 996AA9D0-EAB8-491E-954D-9CD5AC2F08F6 S-1-5-18:NT AUTHORITY\\System:Service:",
- "taskeng.exe CAB5771A-AB87-4C98-A6EF-CE7502A312F1 S-1-5-18:NT AUTHORITY\\System:Service:",
- "\"C:\\Program Files\\Common Files\\Microsoft Shared\\Office15\\OLicenseHeartbeat.exe\"",
- "\"C:\\Program Files\\Microsoft Office\\Office15\\msoia.exe\" scan upload mininterval:2880",
- "\"C:\\Program Files\\Microsoft Office\\Office15\\msoia.exe\" scan upload"
- * Signatures Detected:
- "Description": "SetUnhandledExceptionFilter detected (possible anti-debug)",
- "Details":
- "Description": "Executed a command line with /C or /R argument to terminate command shell on completion which can be used to hide execution",
- "Details":
- "command": "C:\\Windows\\system32\\cmd.exe /c schtasks /create /tn GCWGGK.exe /tr C:\\Users\\user\\AppData\\Roaming\\Windata\\wintaskhost.exe /sc minute /mo 1"
- "Description": "Creates RWX memory",
- "Details":
- "Description": "Detected script timer window indicative of sleep style evasion",
- "Details":
- "Window": "WSH-Timer"
- "Description": "Expresses interest in specific running processes",
- "Details":
- "process": "wscript.exe"
- "Description": "Reads data out of its own binary image",
- "Details":
- "self_read": "process: tslCJf.exe, pid: 1528, offset: 0x00000000, length: 0x00010000"
- "self_read": "process: tslCJf.exe, pid: 1528, offset: 0x00000000, length: 0x000c4c00"
- "self_read": "process: wscript.exe, pid: 1108, offset: 0x00000000, length: 0x00000040"
- "self_read": "process: wscript.exe, pid: 1108, offset: 0x000000f0, length: 0x00000018"
- "self_read": "process: wscript.exe, pid: 1108, offset: 0x000001e8, length: 0x00000078"
- "self_read": "process: wscript.exe, pid: 1108, offset: 0x00018000, length: 0x00000020"
- "self_read": "process: wscript.exe, pid: 1108, offset: 0x00018058, length: 0x00000018"
- "self_read": "process: wscript.exe, pid: 1108, offset: 0x000181a8, length: 0x00000018"
- "self_read": "process: wscript.exe, pid: 1108, offset: 0x00018470, length: 0x00000010"
- "self_read": "process: wscript.exe, pid: 1108, offset: 0x00018640, length: 0x00000012"
- "Description": "The binary likely contains encrypted or compressed data.",
- "Details":
- "section": "name: UPX1, entropy: 7.94, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE, raw_size: 0x00054400, virtual_size: 0x00055000"
- "section": "name: .rsrc, entropy: 7.95, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE, raw_size: 0x00070400, virtual_size: 0x00071000"
- "Description": "The executable is compressed using UPX",
- "Details":
- "section": "name: UPX0, entropy: 0.00, characteristics: IMAGE_SCN_CNT_UNINITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE, raw_size: 0x00000000, virtual_size: 0x000f3000"
- "Description": "A scripting utility was executed",
- "Details":
- "command": "WSCript C:\\Users\\user\\AppData\\Local\\Temp\\GCWGGK.vbs"
- "Description": "Uses Windows utilities for basic functionality",
- "Details":
- "command": "C:\\Windows\\system32\\cmd.exe /c schtasks /create /tn GCWGGK.exe /tr C:\\Users\\user\\AppData\\Roaming\\Windata\\wintaskhost.exe /sc minute /mo 1"
- "command": "C:\\Windows\\system32\\cmd.exe /c schtasks /create /tn GCWGGK.exe /tr C:\\Users\\user\\AppData\\Roaming\\Windata\\wintaskhost.exe /sc minute /mo 1"
- "command": "C:\\Windows\\system32\\cmd.exe /c schtasks /create /tn GCWGGK.exe /tr C:\\Users\\user\\AppData\\Roaming\\Windata\\wintaskhost.exe /sc minute /mo 1"
- "command": "schtasks /create /tn GCWGGK.exe /tr C:\\Users\\user\\AppData\\Roaming\\Windata\\wintaskhost.exe /sc minute /mo 1"
- "command": "schtasks /create /tn GCWGGK.exe /tr C:\\Users\\user\\AppData\\Roaming\\Windata\\wintaskhost.exe /sc minute /mo 1"
- "command": "\"C:\\Program Files\\Common Files\\Microsoft Shared\\Office15\\OLicenseHeartbeat.exe\""
- "Description": "Sniffs keystrokes",
- "Details":
- "SetWindowsHookExW": "Process: explorer.exe(2044)"
- "Description": "A process attempted to delay the analysis task by a long amount of time.",
- "Details":
- "Process": "wscript.exe tried to sleep 2160 seconds, actually delayed analysis time by 0 seconds"
- "Process": "taskeng.exe tried to sleep 670 seconds, actually delayed analysis time by 0 seconds"
- "Process": "svchost.exe tried to sleep 375 seconds, actually delayed analysis time by 0 seconds"
- "Process": "WmiPrvSE.exe tried to sleep 1680 seconds, actually delayed analysis time by 0 seconds"
- "Description": "Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config",
- "Details":
- "regkeyval": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\StartPage2\\ProgramsCache"
- "Description": "Attempts to execute a Living Off The Land Binary command for post exeploitation",
- "Details":
- "MITRE T1078 - schtask": "(Tactic: Execution, Persistence, Privilege Escalation)"
- "Description": "Installs itself for autorun at Windows startup",
- "Details":
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\GCWGGK"
- "data": "\"C:\\Users\\user\\AppData\\Roaming\\Windata\\wintaskhost.exe\""
- "file": "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\GCWGGK.lnk"
- "file": "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\GCWGGK.lnk"
- "task": "C:\\Windows\\system32\\cmd.exe /c schtasks /create /tn GCWGGK.exe /tr C:\\Users\\user\\AppData\\Roaming\\Windata\\wintaskhost.exe /sc minute /mo 1"
- "Description": "File has been identified by 45 Antiviruses on VirusTotal as malicious",
- "Details":
- "MicroWorld-eScan": "Trojan.GenericKD.32294281"
- "FireEye": "Generic.mg.b387816ee869fe5a"
- "CAT-QuickHeal": "Trojanspy.Powershell"
- "McAfee": "RDN/Generic PWS.y"
- "K7AntiVirus": "Trojan ( 00479c481 )"
- "Alibaba": "TrojanSpy:PowerShell/KeyLogger.8458d687"
- "K7GW": "Trojan ( 00479c481 )"
- "Cybereason": "malicious.ee869f"
- "Arcabit": "Trojan.Generic.D1ECC589"
- "Invincea": "heuristic"
- "Cyren": "W32/Trojan.QJEI-9092"
- "Symantec": "Trojan.Gen.MBT"
- "APEX": "Malicious"
- "Avast": "Win32:Trojan-gen"
- "Kaspersky": "Trojan-Spy.PowerShell.KeyLogger.c"
- "BitDefender": "Trojan.GenericKD.32294281"
- "NANO-Antivirus": "Trojan.Win32.PowerShell.fwhrtd"
- "Paloalto": "generic.ml"
- "AegisLab": "Trojan.PowerShell.KeyLogger.l!c"
- "Ad-Aware": "Trojan.GenericKD.32294281"
- "Emsisoft": "Trojan.GenericKD.32294281 (B)"
- "Comodo": "Malware@#2yjl3lbd7o9ej"
- "F-Secure": "Trojan.TR/Autoit.nncwn"
- "TrendMicro": "TROJ_GEN.R002C0PHM19"
- "McAfee-GW-Edition": "BehavesLike.Win32.Dropper.bc"
- "Sophos": "Mal/Generic-S"
- "Ikarus": "Trojan.Win32.Autoit"
- "Avira": "TR/Autoit.nncwn"
- "Microsoft": "Trojan:Win32/Skeeyah.A!MTB"
- "ViRobot": "Trojan.Win32.Z.Nymeria.805888"
- "ZoneAlarm": "Trojan-Spy.PowerShell.KeyLogger.c"
- "GData": "Trojan.GenericKD.32294281"
- "AhnLab-V3": "Malware/Win32.RL_Generic.R264020"
- "Acronis": "suspicious"
- "VBA32": "Trojan.Autoit.F"
- "ALYac": "Trojan.GenericKD.32294281"
- "MAX": "malware (ai score=87)"
- "Cylance": "Unsafe"
- "ESET-NOD32": "a variant of Win32/Autoit.DB"
- "TrendMicro-HouseCall": "TROJ_GEN.R002C0PHM19"
- "Fortinet": "AutoIt/Agent.DB!tr"
- "AVG": "Win32:Trojan-gen"
- "Panda": "Trj/CI.A"
- "CrowdStrike": "win/malicious_confidence_90% (W)"
- "Qihoo-360": "Win32/Trojan.Spy.0cc"
- "Description": "Creates a copy of itself",
- "Details":
- "copy": "C:\\Users\\user\\AppData\\Roaming\\Windata\\wintaskhost.exe"
- * Started Service:
- * Mutexes:
- "Local\\ZoneAttributeCacheCounterMutex",
- "Local\\ZonesCacheCounterMutex",
- "Local\\ZonesLockedCacheCounterMutex",
- "Global\\ADAP_WMI_ENTRY",
- "Global\\RefreshRA_Mutex",
- "Global\\RefreshRA_Mutex_Lib",
- "Global\\RefreshRA_Mutex_Flag"
- * Modified Files:
- "C:\\Users\\user\\AppData\\Roaming\\Windata\\wintaskhost.exe",
- "\\??\\PIPE\\srvsvc",
- "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\GCWGGK.lnk",
- "C:\\Users\\user\\AppData\\Local\\Temp\\GCWGGK.vbs",
- "\\Device\\LanmanDatagramReceiver",
- "C:\\Windows\\SoftwareDistribution\\DataStore\\DataStore.edb",
- "C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\edb.chk",
- "\\??\\pipe\\PIPE_EVENTROOT\\CIMV2PROVIDERSUBSYSTEM"
- * Deleted Files:
- "C:\\Windows\\Tasks\\GCWGGK.exe.job",
- "C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\edbtmp.log"
- * Modified Registry Keys:
- "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\GCWGGK",
- "HKEY_CURRENT_USER\\Software\\Win32",
- "HKEY_CURRENT_USER\\Software\\Win32\\GCWGGK",
- "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\StartPage2\\ProgramsCache",
- "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\UserAssist\\CEBFF5CD-ACE2-4F4F-9178-9926F41749EA\\Count\\S38OS404-1Q43-42S2-9305-67QR0O28SP23\\rkcybere.rkr",
- "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\UserAssist\\CEBFF5CD-ACE2-4F4F-9178-9926F41749EA\\Count\\HRZR_PGYFRFFVBA",
- "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\UserAssist\\CEBFF5CD-ACE2-4F4F-9178-9926F41749EA\\Count\\1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7\\pzq.rkr",
- "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Action Center\\Checks\\11CD958A-C507-4EF3-B3F2-5FD9DFBD2C78.check.101\\CheckSetting",
- "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\UNCAsIntranet",
- "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\AutoDetect",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\A71AA3D4-1416-49E7-950B-7E87D9A77745\\Path",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\A71AA3D4-1416-49E7-950B-7E87D9A77745\\Hash",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tree\\GCWGGK.exe\\Id",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tree\\GCWGGK.exe\\Index",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\A71AA3D4-1416-49E7-950B-7E87D9A77745\\Triggers",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\A71AA3D4-1416-49E7-950B-7E87D9A77745\\DynamicInfo",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\ED0D73D7-BC97-46E2-AC55-FD6EB3F72C05\\DynamicInfo",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\FEB62FD4-1C1D-45E8-946A-9AA5085B45BB",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\B17E070E-57E3-43F6-96F5-A9A9C921DEBF\\DynamicInfo",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\C34C0583-B73E-4BF1-AA7F-CD741EFE824D",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tasks\\DF000DCA-3FA2-48A6-9E59-C0606F9F8D73\\DynamicInfo",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\996AA9D0-EAB8-491E-954D-9CD5AC2F08F6",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\CAB5771A-AB87-4C98-A6EF-CE7502A312F1",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\FEB62FD4-1C1D-45E8-946A-9AA5085B45BB\\data",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\C34C0583-B73E-4BF1-AA7F-CD741EFE824D\\data",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\996AA9D0-EAB8-491E-954D-9CD5AC2F08F6\\data",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\Handshake\\CAB5771A-AB87-4C98-A6EF-CE7502A312F1\\data"
- * Deleted Registry Keys:
- "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Enum\\PCIIDE\\IDECHANNEL\\4&2617AEAE&0&1\\CustomPropertyHwIdKey",
- "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Enum\\PCIIDE\\IDECHANNEL\\4&2617AEAE&0&0\\CustomPropertyHwIdKey",
- "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\ProxyBypass",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\ProxyBypass",
- "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\IntranetName",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\IntranetName",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\CompatibilityAdapter\\Signatures\\GCWGGK.exe.job",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\CompatibilityAdapter\\Signatures\\GCWGGK.exe.job.fp"
- * DNS Communications:
- "type": "A",
- "request": "plunder.nsupdate.info",
- "answers":
- "data": "79.134.225.71",
- "type": "A"
- * Domains:
- "ip": "79.134.225.71",
- "domain": "plunder.nsupdate.info"
- * Network Communication - ICMP:
- * Network Communication - HTTP:
- * Network Communication - SMTP:
- * Network Communication - Hosts:
- "country_name": "Switzerland",
- "ip": "79.134.225.71",
- "inaddrarpa": "",
- "hostname": "plunder.nsupdate.info"
- * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment