Advertisement
paladin316

2291Exes_dd56e1d4529217bba2a85a97f410b993_html_2019-09-18_13_30.txt

Sep 18th, 2019
1,341
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 11.96 KB | None | 0 0
  1.  
  2. * ID: 2291
  3. * MalFamily: ""
  4.  
  5. * MalScore: 10.0
  6.  
  7. * File Name: "Exes_dd56e1d4529217bba2a85a97f410b993.html"
  8. * File Size: 275968
  9. * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
  10. * SHA256: "309db6c75c9878ca3297382833cba690a4d81baadc206689f344aca0dcc74d5a"
  11. * MD5: "dd56e1d4529217bba2a85a97f410b993"
  12. * SHA1: "e646976267d6adf08067f830d5773f5ff67cebea"
  13. * SHA512: "9bdfe0d79f13f5f14e70f52160bdffef955a213cd99dcf085902a02c6d4f8a2de03ff7017e77f97161ed52591617d35c58e0326687cec939c42701e8299bbf89"
  14. * CRC32: "854D3FE6"
  15. * SSDEEP: "1536:g/NNNz/SNNrsnafpeqxhCh/uP8TIaWgGOkXFn2gZVKjijR1WS75TwkmwgSa8wTBz:gl/2NaafpxemE/W92gajiN5TGVxB814"
  16.  
  17. * Process Execution:
  18. "BJZsBsIP39vS3.exe",
  19. "BJZsBsIP39vS3.exe",
  20. "explorer.exe",
  21. "services.exe",
  22. "historymachine.exe",
  23. "historymachine.exe",
  24. "svchost.exe",
  25. "WmiApSrv.exe",
  26. "svchost.exe",
  27. "taskhost.exe",
  28. "WmiPrvSE.exe"
  29.  
  30.  
  31. * Executed Commands:
  32. "C:\\Users\\user\\AppData\\Local\\Temp\\BJZsBsIP39vS3.exe --8f2f2844",
  33. "\"C:\\Windows\\SysWOW64\\historymachine.exe\"",
  34. "C:\\Windows\\System32\\svchost.exe -k WerSvcGroup",
  35. "C:\\Windows\\system32\\wbem\\WmiApSrv.exe",
  36. "C:\\Windows\\system32\\svchost.exe -k netsvcs",
  37. "C:\\Windows\\SysWOW64\\historymachine.exe --81d93c85"
  38.  
  39.  
  40. * Signatures Detected:
  41.  
  42. "Description": "Behavioural detection: Executable code extraction",
  43. "Details":
  44.  
  45.  
  46. "Description": "SetUnhandledExceptionFilter detected (possible anti-debug)",
  47. "Details":
  48.  
  49.  
  50. "Description": "Communicates with IPs located across a large number of unique countries",
  51. "Details":
  52.  
  53. "country": "United Arab Emirates"
  54.  
  55.  
  56. "country": "Russian Federation"
  57.  
  58.  
  59. "country": "Puerto Rico"
  60.  
  61.  
  62. "country": "United States"
  63.  
  64.  
  65. "country": "Thailand"
  66.  
  67.  
  68. "country": "Argentina"
  69.  
  70.  
  71. "country": "Costa Rica"
  72.  
  73.  
  74. "country": "Colombia"
  75.  
  76.  
  77. "country": "Chile"
  78.  
  79.  
  80. "country": "Singapore"
  81.  
  82.  
  83.  
  84.  
  85. "Description": "Creates RWX memory",
  86. "Details":
  87.  
  88.  
  89. "Description": "Possible date expiration check, exits too soon after checking local time",
  90. "Details":
  91.  
  92. "process": "historymachine.exe, PID 1612"
  93.  
  94.  
  95.  
  96.  
  97. "Description": "Mimics the system's user agent string for its own requests",
  98. "Details":
  99.  
  100.  
  101. "Description": "Guard pages use detected - possible anti-debugging.",
  102. "Details":
  103.  
  104.  
  105. "Description": "Performs HTTP requests potentially not found in PCAP.",
  106. "Details":
  107.  
  108. "url_ioc": "78.109.34.178:443/acquire/site/scripts/merge/"
  109.  
  110.  
  111. "url_ioc": "70.45.30.28:80/odbc/img/enabled/merge/"
  112.  
  113.  
  114.  
  115.  
  116. "Description": "Drops a binary and executes it",
  117. "Details":
  118.  
  119. "binary": "C:\\Windows\\SysWOW64\\historymachine.exe"
  120.  
  121.  
  122.  
  123.  
  124. "Description": "Multiple direct IP connections",
  125. "Details":
  126.  
  127. "direct_ip_connections": "Made direct connections to 15 unique IP addresses"
  128.  
  129.  
  130.  
  131.  
  132. "Description": "Deletes its original binary from disk",
  133. "Details":
  134.  
  135.  
  136. "Description": "Attempts to remove evidence of file being downloaded from the Internet",
  137. "Details":
  138.  
  139. "file": "C:\\Windows\\SysWOW64\\historymachine.exe:Zone.Identifier"
  140.  
  141.  
  142.  
  143.  
  144. "Description": "Attempts to repeatedly call a single API many times in order to delay analysis time",
  145. "Details":
  146.  
  147. "Spam": "services.exe (504) called API GetSystemTimeAsFileTime 14777086 times"
  148.  
  149.  
  150.  
  151.  
  152. "Description": "Installs itself for autorun at Windows startup",
  153. "Details":
  154.  
  155. "service name": "historymachine"
  156.  
  157.  
  158. "service path": "\"C:\\Windows\\SysWOW64\\historymachine.exe\""
  159.  
  160.  
  161.  
  162.  
  163. "Description": "File has been identified by 28 Antiviruses on VirusTotal as malicious",
  164. "Details":
  165.  
  166. "Bkav": "W32.HfsAutoB."
  167.  
  168.  
  169. "MicroWorld-eScan": "Trojan.Emotet.ACJ"
  170.  
  171.  
  172. "FireEye": "Generic.mg.dd56e1d4529217bb"
  173.  
  174.  
  175. "McAfee": "GenericR-QRI!DD56E1D45292"
  176.  
  177.  
  178. "Cybereason": "malicious.452921"
  179.  
  180.  
  181. "Invincea": "heuristic"
  182.  
  183.  
  184. "Symantec": "Trojan.Emotet!gm"
  185.  
  186.  
  187. "APEX": "Malicious"
  188.  
  189.  
  190. "Kaspersky": "UDS:DangerousObject.Multi.Generic"
  191.  
  192.  
  193. "Paloalto": "generic.ml"
  194.  
  195.  
  196. "AegisLab": "Trojan.Win32.Generic.4!c"
  197.  
  198.  
  199. "Endgame": "malicious (high confidence)"
  200.  
  201.  
  202. "McAfee-GW-Edition": "BehavesLike.Win32.Generic.dt"
  203.  
  204.  
  205. "Sophos": "Mal/Emotet-Q"
  206.  
  207.  
  208. "SentinelOne": "DFI - Suspicious PE"
  209.  
  210.  
  211. "Webroot": "W32.Trojan.Emotet"
  212.  
  213.  
  214. "Microsoft": "Trojan:Win32/Emotet.BS!MTB"
  215.  
  216.  
  217. "ZoneAlarm": "UDS:DangerousObject.Multi.Generic"
  218.  
  219.  
  220. "GData": "Trojan.Emotet.ACJ"
  221.  
  222.  
  223. "AhnLab-V3": "Malware/Win32.Generic.C3472442"
  224.  
  225.  
  226. "Acronis": "suspicious"
  227.  
  228.  
  229. "VBA32": "Malware-Cryptor.Limpopo"
  230.  
  231.  
  232. "MAX": "malware (ai score=89)"
  233.  
  234.  
  235. "Cylance": "Unsafe"
  236.  
  237.  
  238. "Rising": "Trojan.Kryptik!8.8 (TFE:4:LZUqZZThnqL)"
  239.  
  240.  
  241. "Fortinet": "W32/GenKryptik.DTDM!tr"
  242.  
  243.  
  244. "CrowdStrike": "win/malicious_confidence_100% (W)"
  245.  
  246.  
  247. "Qihoo-360": "HEUR/QVM20.1.F70F.Malware.Gen"
  248.  
  249.  
  250.  
  251.  
  252. "Description": "Creates a copy of itself",
  253. "Details":
  254.  
  255. "copy": "C:\\Windows\\SysWOW64\\historymachine.exe"
  256.  
  257.  
  258.  
  259.  
  260. "Description": "Created network traffic indicative of malicious activity",
  261. "Details":
  262.  
  263. "signature": "ET CNC Feodo Tracker Reported CnC Server group 3"
  264.  
  265.  
  266. "signature": "ET CNC Feodo Tracker Reported CnC Server group 12"
  267.  
  268.  
  269. "signature": "ET CNC Feodo Tracker Reported CnC Server group 17"
  270.  
  271.  
  272.  
  273.  
  274.  
  275. * Started Service:
  276. "historymachine",
  277. "WerSvc",
  278. "wmiApSrv"
  279.  
  280.  
  281. * Mutexes:
  282. "Global\\IC1C5B64F",
  283. "Global\\MC1C5B64F",
  284. "IESQMMUTEX_0_208",
  285. "Global\\RefreshRA_Mutex_Lib",
  286. "Global\\RefreshRA_Mutex",
  287. "Global\\RefreshRA_Mutex_Flag",
  288. "Global\\WmiApSrv"
  289.  
  290.  
  291. * Modified Files:
  292. "C:\\Windows\\SysWOW64\\historymachine.exe",
  293. "C:\\Windows\\sysnative\\LogFiles\\Scm\\5869f1c1-01d7-41f7-84b7-715672259fa8",
  294. "\\??\\WMIDataDevice",
  295. "\\??\\PIPE\\samr",
  296. "C:\\Windows\\sysnative\\wbem\\repository\\WRITABLE.TST",
  297. "C:\\Windows\\sysnative\\wbem\\repository\\MAPPING1.MAP",
  298. "C:\\Windows\\sysnative\\wbem\\repository\\MAPPING2.MAP",
  299. "C:\\Windows\\sysnative\\wbem\\repository\\MAPPING3.MAP",
  300. "C:\\Windows\\sysnative\\wbem\\repository\\OBJECTS.DATA",
  301. "C:\\Windows\\sysnative\\wbem\\repository\\INDEX.BTR",
  302. "\\??\\pipe\\PIPE_EVENTROOT\\CIMV2PROVIDERSUBSYSTEM",
  303. "\\??\\pipe\\PIPE_EVENTROOT\\CIMV2WMI SELF-INSTRUMENTATION EVENT PROVIDER"
  304.  
  305.  
  306. * Deleted Files:
  307. "C:\\Windows\\SysWOW64\\khmerflows.exe",
  308. "C:\\Users\\user\\AppData\\Local\\Temp\\BJZsBsIP39vS3.exe",
  309. "C:\\Windows\\SysWOW64\\historymachine.exe:Zone.Identifier"
  310.  
  311.  
  312. * Modified Registry Keys:
  313. "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\WerSvc\\Type",
  314. "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\wmiApSrv\\Type",
  315. "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winmgmt\\Type",
  316. "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Connections\\DefaultConnectionSettings",
  317. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\PROVIDERS\\Performance\\Performance Refreshed",
  318. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\ProcessID",
  319. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\ThrottleDrege",
  320. "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winmgmt\\Parameters\\ServiceDllUnloadOnStop",
  321. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\LastServiceStart",
  322. "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Wbem\\Transports\\Decoupled\\Server",
  323. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\Transports\\Decoupled\\Server\\CreationTime",
  324. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\Transports\\Decoupled\\Server\\MarshaledProxy",
  325. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\Transports\\Decoupled\\Server\\ProcessIdentifier",
  326. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\ConfigValueEssNeedsLoading",
  327. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\List of event-active namespaces",
  328. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\ESS\\//./root/CIMV2\\SCM Event Provider"
  329.  
  330.  
  331. * Deleted Registry Keys:
  332.  
  333. * DNS Communications:
  334.  
  335. * Domains:
  336.  
  337. * Network Communication - ICMP:
  338.  
  339. * Network Communication - HTTP:
  340.  
  341. * Network Communication - SMTP:
  342.  
  343. * Network Communication - Hosts:
  344.  
  345. "country_name": "United Arab Emirates",
  346. "ip": "83.110.75.153",
  347. "inaddrarpa": "",
  348. "hostname": ""
  349.  
  350.  
  351. "country_name": "Russian Federation",
  352. "ip": "78.109.34.178",
  353. "inaddrarpa": "",
  354. "hostname": ""
  355.  
  356.  
  357. "country_name": "Puerto Rico",
  358. "ip": "70.45.30.28",
  359. "inaddrarpa": "",
  360. "hostname": ""
  361.  
  362.  
  363. "country_name": "United States",
  364. "ip": "45.33.1.161",
  365. "inaddrarpa": "",
  366. "hostname": ""
  367.  
  368.  
  369. "country_name": "United States",
  370. "ip": "216.70.88.55",
  371. "inaddrarpa": "",
  372. "hostname": ""
  373.  
  374.  
  375. "country_name": "United States",
  376. "ip": "216.154.222.52",
  377. "inaddrarpa": "",
  378. "hostname": ""
  379.  
  380.  
  381. "country_name": "Thailand",
  382. "ip": "203.150.19.63",
  383. "inaddrarpa": "",
  384. "hostname": ""
  385.  
  386.  
  387. "country_name": "United States",
  388. "ip": "192.163.221.191",
  389. "inaddrarpa": "",
  390. "hostname": ""
  391.  
  392.  
  393. "country_name": "Argentina",
  394. "ip": "190.55.86.138",
  395. "inaddrarpa": "",
  396. "hostname": ""
  397.  
  398.  
  399. "country_name": "Costa Rica",
  400. "ip": "190.171.105.158",
  401. "inaddrarpa": "",
  402. "hostname": ""
  403.  
  404.  
  405. "country_name": "Colombia",
  406. "ip": "190.146.81.138",
  407. "inaddrarpa": "",
  408. "hostname": ""
  409.  
  410.  
  411. "country_name": "Chile",
  412. "ip": "190.13.146.47",
  413. "inaddrarpa": "",
  414. "hostname": ""
  415.  
  416.  
  417. "country_name": "Argentina",
  418. "ip": "190.104.64.197",
  419. "inaddrarpa": "",
  420. "hostname": ""
  421.  
  422.  
  423. "country_name": "Argentina",
  424. "ip": "152.168.220.188",
  425. "inaddrarpa": "",
  426. "hostname": ""
  427.  
  428.  
  429. "country_name": "Singapore",
  430. "ip": "139.59.242.76",
  431. "inaddrarpa": "",
  432. "hostname": ""
  433.  
  434.  
  435.  
  436. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement