Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- * ID: 2333
- * MalFamily: ""
- * MalScore: 10.0
- * File Name: "Exes_5ac69ed046e3036e468ac4873dc803dc.exe"
- * File Size: 378880
- * File Type: "MS-DOS executable"
- * SHA256: "fe9c6f1dc92613fa807829605b585267e545f8d27a2c41b210aa175a4d651368"
- * MD5: "5ac69ed046e3036e468ac4873dc803dc"
- * SHA1: "8a286658747b17f38a62c08413e7d09d090f0366"
- * SHA512: "0b56688b2775c0b76b05d27150fb8ac47f8dddf049270ddd8f84cb8ce32d83f9e89e6fea11d9af948aaf2170b9f90dcc4570cd7d9590fa1f065ad4afc6028e28"
- * CRC32: "2B91177E"
- * SSDEEP: "6144:gKWw79GUs8uTCDBNFDAeHsgLyQmP5Mdu6s16lGGxk5OaH09KQJmehrY:giPOC8eHpLyJe1lVKjVQne"
- * Process Execution:
- "rl8Npxu54.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "cmd.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "cmd.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "cmd.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "cmd.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "cmd.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "cmd.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "cmd.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "cmd.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "cmd.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "cmd.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "cmd.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "cmd.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "cmd.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "cmd.exe",
- "wscript.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "taskkill.exe",
- "cmd.exe",
- "svchost.exe",
- "WMIADAP.exe"
- * Executed Commands:
- "cmd /c taskkill /f /im SQLAGENTSZW.exe",
- "cmd /c taskkill /f /im SQLAGENTSLW.exe",
- "cmd /c taskkill /f /im SQLAGENTSKW.exe",
- "cmd /c taskkill /f /im SQLAGENTSJW.exe",
- "cmd /c taskkill /f /im SQLAGENTSHW.exe",
- "cmd /c taskkill /f /im SQLAGENTSGW.exe",
- "cmd /c taskkill /f /im SQLAGENTSFW.exe",
- "cmd /c taskkill /f /im SQLAGENTSEW.exe",
- "cmd /c taskkill /f /im SQLAGENTSDW.exe",
- "cmd /c taskkill /f /im SQLAGENTSCW.exe",
- "cmd /c taskkill /f /im SQLAGENTSBW.exe",
- "cmd /c taskkill /f /im SQLAGENTSAW.exe",
- "cmd /c taskkill /f /im taskmgzr.exe",
- "cmd /c del /f /a /q C:\\ProgramData\\taskmgzr.exe",
- "cmd /c del /f /a /q C:\\RECYCLER\\taskmgzr.exe",
- "cmd /c taskkill /f /im ftp.exe",
- "cmd /c taskkill /f /im p.exe",
- "cmd /c del /f /a /q C:\\ProgramData\\winsql.dat",
- "cmd /c del /f /a /q C:\\RECYCLER\\winsql.dat",
- "cmd /c taskkill /f /im TQQ.exe",
- "cmd /c del /f /a /q C:\\ProgramData\\TQQ.exe",
- "cmd /c del /f /a /q C:\\RECYCLER\\TQQ.exe",
- "cmd /c taskkill /f /im down.exe",
- "cmd /c del /f /a /q C:\\ProgramData\\down.exe",
- "cmd /c del /f /a /q C:\\RECYCLER\\down.exe",
- "cmd /c taskkill /f /im MpMgSvc.dll",
- "cmd /c del /f /a /q C:\\ProgramData\\MpMgSvc.dll",
- "cmd /c del /f /a /q C:\\RECYCLER\\MpMgSvc.dll",
- "cmd /c taskkill /f /im MS17.exe",
- "cmd /c del /f /a /q C:\\ProgramData\\MS17.exe",
- "cmd /c del /f /a /q C:\\RECYCLER\\MS17.exe",
- "cmd /c taskkill /f /im MSSQLL.exe",
- "cmd /c del /f /a /q C:\\ProgramData\\MSSQLL.exe",
- "cmd /c del /f /a /q C:\\RECYCLER\\MSSQLL.exe",
- "cmd /c taskkill /f /im TrustedInsteller.exe",
- "cmd /c del /f /a /q C:\\ProgramData\\TrustedInsteller.exe",
- "cmd /c del /f /a /q C:\\RECYCLER\\TrustedInsteller.exe",
- "cmd /c taskkill /f /im TQ.exe",
- "cmd /c del /f /a /q C:\\ProgramData\\TQ.exe",
- "cmd /c del /f /a /q C:\\RECYCLER\\TQ.exe",
- "cmd /c taskkill /f /im ab2.exe",
- "cmd /c del /f /a /q C:\\ProgramData\\ab2.exe",
- "cmd /c del /f /a /q C:\\RECYCLER\\ab2.exe",
- "cmd /c taskkill /f /im ab1.exe",
- "cmd /c del /f /a /q C:\\ProgramData\\ab1.exe",
- "cmd /c del /f /a /q C:\\RECYCLER\\ab1.exe",
- "cmd /c taskkill /f /im winxmr.exe",
- "cmd /c del /f /a /q C:\\ProgramData\\winxmr.exe",
- "cmd /c del /f /a /q C:\\RECYCLER\\winxmr.exe",
- "cmd /c taskkill /f /im Rnaphin.exe",
- "cmd /c del /f /a /q %ProgramFiles%\\Microsoft Rntel 2.14.2\\Rnaphin.exe",
- "\"C:\\Windows\\System32\\WScript.exe\" \"C:\\Users\\user\\AppData\\Local\\Temp\\VBS.vbs\"",
- "C:\\Users\\user\\AppData\\Local\\Temp\\VBS.vbs ",
- "cmd /c taskkill /f /im taskmgr.exe",
- "taskkill /f /im SQLAGENTSZW.exe",
- "taskkill /f /im SQLAGENTSLW.exe",
- "taskkill /f /im SQLAGENTSKW.exe",
- "taskkill /f /im SQLAGENTSJW.exe",
- "taskkill /f /im SQLAGENTSHW.exe",
- "taskkill /f /im SQLAGENTSGW.exe",
- "taskkill /f /im SQLAGENTSFW.exe",
- "taskkill /f /im SQLAGENTSEW.exe",
- "taskkill /f /im SQLAGENTSDW.exe",
- "taskkill /f /im SQLAGENTSCW.exe",
- "taskkill /f /im SQLAGENTSBW.exe",
- "taskkill /f /im SQLAGENTSAW.exe",
- "taskkill /f /im taskmgzr.exe",
- "\\\\?\\C:\\Windows\\system32\\wbem\\WMIADAP.EXE wmiadap.exe /F /T /R",
- "taskkill /f /im ftp.exe",
- "taskkill /f /im p.exe",
- "taskkill /f /im TQQ.exe",
- "taskkill /f /im down.exe",
- "taskkill /f /im MpMgSvc.dll",
- "taskkill /f /im MS17.exe",
- "taskkill /f /im MSSQLL.exe",
- "taskkill /f /im TrustedInsteller.exe",
- "taskkill /f /im TQ.exe",
- "taskkill /f /im ab2.exe",
- "taskkill /f /im ab1.exe",
- "taskkill /f /im winxmr.exe",
- "taskkill /f /im Rnaphin.exe",
- "\"C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSWW.exe\"",
- "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSWW.exe ",
- "taskkill /f /im taskmgr.exe"
- * Signatures Detected:
- "Description": "SetUnhandledExceptionFilter detected (possible anti-debug)",
- "Details":
- "Description": "Behavioural detection: Executable code extraction",
- "Details":
- "Description": "Attempts to connect to a dead IP:Port (2 unique times)",
- "Details":
- "IP_ioc": "185.172.66.203:9383 (Germany)"
- "IP_ioc": "169.254.255.254:9383"
- "Description": "Executed a command line with /C or /R argument to terminate command shell on completion which can be used to hide execution",
- "Details":
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\taskmgzr.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\winsql.dat"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\TQQ.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\down.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\MpMgSvc.dll"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\MS17.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\MSSQLL.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\TrustedInsteller.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\TQ.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\ab2.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\ab1.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\winxmr.exe"
- "command": "cmd /c del /f /a /q %ProgramFiles%\\Microsoft Rntel 2.14.2\\Rnaphin.exe"
- "Description": "Creates RWX memory",
- "Details":
- "Description": "Anomalous file deletion behavior detected (10+)",
- "Details":
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSZW.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSLW.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSKW.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSJW.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSHW.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSGW.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSFW.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSDW.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSCW.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSBW.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSAW.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\AutoRunApp.vbs"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\VBS.vbs"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\config.json"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\CPU_\\xef\\xbe\\xb2\\xef\\xbf\\x8e\\xef\\xbf\\x8a\\xef\\xbf\\xbd.txt"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\NVDIA_\\xef\\xbe\\xb2\\xef\\xbf\\x8e\\xef\\xbf\\x8a\\xef\\xbf\\xbd.txt"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\AMD_\\xef\\xbe\\xb2\\xef\\xbf\\x8e\\xef\\xbf\\x8a\\xef\\xbf\\xbd.txt"
- "DeletedFile": "C:\\ProgramData\\taskmgzr.exe"
- "DeletedFile": "C:\\RECYCLER\\taskmgzr.exe"
- "DeletedFile": "C:\\ProgramData\\winsql.dat"
- "DeletedFile": "C:\\RECYCLER\\winsql.dat"
- "DeletedFile": "C:\\ProgramData\\winsql.dat"
- "DeletedFile": "C:\\RECYCLER\\winsql.dat"
- "DeletedFile": "C:\\ProgramData\\TQQ.exe"
- "DeletedFile": "C:\\RECYCLER\\TQQ.exe"
- "DeletedFile": "C:\\ProgramData\\down.exe"
- "DeletedFile": "C:\\RECYCLER\\down.exe"
- "DeletedFile": "C:\\ProgramData\\MpMgSvc.dll"
- "DeletedFile": "C:\\RECYCLER\\MpMgSvc.dll"
- "DeletedFile": "C:\\ProgramData\\MS17.exe"
- "DeletedFile": "C:\\RECYCLER\\MS17.exe"
- "DeletedFile": "C:\\ProgramData\\MSSQLL.exe"
- "DeletedFile": "C:\\RECYCLER\\MSSQLL.exe"
- "DeletedFile": "C:\\ProgramData\\TrustedInsteller.exe"
- "DeletedFile": "C:\\RECYCLER\\TrustedInsteller.exe"
- "DeletedFile": "C:\\ProgramData\\TQ.exe"
- "DeletedFile": "C:\\RECYCLER\\TQ.exe"
- "DeletedFile": "C:\\ProgramData\\ab2.exe"
- "DeletedFile": "C:\\RECYCLER\\ab2.exe"
- "DeletedFile": "C:\\ProgramData\\ab1.exe"
- "DeletedFile": "C:\\RECYCLER\\ab1.exe"
- "DeletedFile": "C:\\ProgramData\\winxmr.exe"
- "DeletedFile": "C:\\RECYCLER\\winxmr.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\%ProgramFiles%\\Microsoft Rntel 2.14.2\\Rnaphin.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\%ProgramFiles%\\Microsoft Rntel 2.14.2\\Rnaphin.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Tempsysermad.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\TempXMRig.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\TempXMR.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temptaobao.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Tempchrom.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Tempchromes.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\TempMiner.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Tempm6.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Tempm7.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Tempmyssssql.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temptaskmgr.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Tempcpu.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Tempx6.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Tempwin64.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Tempwin32.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Tempwin64.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Tempwin32.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Tempvip.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Tempvpn.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp370.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\TempaIg.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTC.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\CPU_log1.txt"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\CPU_log.txt"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTN.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\N_log1.txt"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\N_log.txt"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTA.exe"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\A_log1.txt"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\A_log.txt"
- "DeletedFile": "C:\\Users\\user\\AppData\\Local\\Temp\\VBS.vbs"
- "DeletedFile": "C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\edbtmp.log"
- "Description": "Guard pages use detected - possible anti-debugging.",
- "Details":
- "Description": "Detected script timer window indicative of sleep style evasion",
- "Details":
- "Window": "WSH-Timer"
- "Description": "Performs HTTP requests potentially not found in PCAP.",
- "Details":
- "url_ioc": "c.xzzzx.ga:80//o/cpu64.exe"
- "Description": "Expresses interest in specific running processes",
- "Details":
- "process": "cmd.exe"
- "Description": "Repeatedly searches for a not-found process, may want to run with startbrowser=1 option",
- "Details":
- "Description": "Reads data out of its own binary image",
- "Details":
- "self_read": "process: wscript.exe, pid: 4072, offset: 0x00000000, length: 0x00000040"
- "self_read": "process: wscript.exe, pid: 4072, offset: 0x000000f0, length: 0x00000018"
- "self_read": "process: wscript.exe, pid: 4072, offset: 0x000001e8, length: 0x00000078"
- "self_read": "process: wscript.exe, pid: 4072, offset: 0x00018000, length: 0x00000020"
- "self_read": "process: wscript.exe, pid: 4072, offset: 0x00018058, length: 0x00000018"
- "self_read": "process: wscript.exe, pid: 4072, offset: 0x000181a8, length: 0x00000018"
- "self_read": "process: wscript.exe, pid: 4072, offset: 0x00018470, length: 0x00000010"
- "self_read": "process: wscript.exe, pid: 4072, offset: 0x00018640, length: 0x00000012"
- "Description": "A process created a hidden window",
- "Details":
- "Process": "svchost.exe -> \\\\?\\C:\\Windows\\system32\\wbem\\WMIADAP.EXE"
- "Description": "Unconventionial language used in binary resources: Chinese (Simplified)",
- "Details":
- "Description": "The binary likely contains encrypted or compressed data.",
- "Details":
- "section": "name: .MPRESS1, entropy: 8.00, characteristics: IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_CNT_UNINITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE, raw_size: 0x00056000, virtual_size: 0x0012f000"
- "Description": "A scripting utility was executed",
- "Details":
- "command": "\"C:\\Windows\\System32\\WScript.exe\" \"C:\\Users\\user\\AppData\\Local\\Temp\\VBS.vbs\""
- "Description": "Uses Windows utilities for basic functionality",
- "Details":
- "command": "cmd /c taskkill /f /im SQLAGENTSZW.exe"
- "command": "cmd /c taskkill /f /im SQLAGENTSLW.exe"
- "command": "cmd /c taskkill /f /im SQLAGENTSKW.exe"
- "command": "cmd /c taskkill /f /im SQLAGENTSJW.exe"
- "command": "cmd /c taskkill /f /im SQLAGENTSHW.exe"
- "command": "cmd /c taskkill /f /im SQLAGENTSGW.exe"
- "command": "cmd /c taskkill /f /im SQLAGENTSFW.exe"
- "command": "cmd /c taskkill /f /im SQLAGENTSEW.exe"
- "command": "cmd /c taskkill /f /im SQLAGENTSDW.exe"
- "command": "cmd /c taskkill /f /im SQLAGENTSCW.exe"
- "command": "cmd /c taskkill /f /im SQLAGENTSBW.exe"
- "command": "cmd /c taskkill /f /im SQLAGENTSAW.exe"
- "command": "cmd /c taskkill /f /im taskmgzr.exe"
- "command": "cmd /c del /f /a /q C:\\ProgramData\\taskmgzr.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\taskmgzr.exe"
- "command": "cmd /c taskkill /f /im ftp.exe"
- "command": "cmd /c taskkill /f /im p.exe"
- "command": "cmd /c del /f /a /q C:\\ProgramData\\winsql.dat"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\winsql.dat"
- "command": "cmd /c taskkill /f /im TQQ.exe"
- "command": "cmd /c del /f /a /q C:\\ProgramData\\TQQ.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\TQQ.exe"
- "command": "cmd /c taskkill /f /im down.exe"
- "command": "cmd /c del /f /a /q C:\\ProgramData\\down.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\down.exe"
- "command": "cmd /c taskkill /f /im MpMgSvc.dll"
- "command": "cmd /c del /f /a /q C:\\ProgramData\\MpMgSvc.dll"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\MpMgSvc.dll"
- "command": "cmd /c taskkill /f /im MS17.exe"
- "command": "cmd /c del /f /a /q C:\\ProgramData\\MS17.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\MS17.exe"
- "command": "cmd /c taskkill /f /im MSSQLL.exe"
- "command": "cmd /c del /f /a /q C:\\ProgramData\\MSSQLL.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\MSSQLL.exe"
- "command": "cmd /c taskkill /f /im TrustedInsteller.exe"
- "command": "cmd /c del /f /a /q C:\\ProgramData\\TrustedInsteller.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\TrustedInsteller.exe"
- "command": "cmd /c taskkill /f /im TQ.exe"
- "command": "cmd /c del /f /a /q C:\\ProgramData\\TQ.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\TQ.exe"
- "command": "cmd /c taskkill /f /im ab2.exe"
- "command": "cmd /c del /f /a /q C:\\ProgramData\\ab2.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\ab2.exe"
- "command": "cmd /c taskkill /f /im ab1.exe"
- "command": "cmd /c del /f /a /q C:\\ProgramData\\ab1.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\ab1.exe"
- "command": "cmd /c taskkill /f /im winxmr.exe"
- "command": "cmd /c del /f /a /q C:\\ProgramData\\winxmr.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\winxmr.exe"
- "command": "cmd /c taskkill /f /im Rnaphin.exe"
- "command": "cmd /c del /f /a /q %ProgramFiles%\\Microsoft Rntel 2.14.2\\Rnaphin.exe"
- "command": "cmd /c taskkill /f /im taskmgr.exe"
- "Description": "A process attempted to delay the analysis task by a long amount of time.",
- "Details":
- "Process": "wscript.exe tried to sleep 1921 seconds, actually delayed analysis time by 0 seconds"
- "Process": "taskkill.exe tried to sleep 3303 seconds, actually delayed analysis time by 0 seconds"
- "Description": "Installs itself for autorun at Windows startup",
- "Details":
- "key": "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\Run\\ADSL Dial"
- "data": "C:\\Users\\user\\AppData\\Local\\Temp\\\\rl8Npxu54.exe"
- "Description": "Creates a hidden or system file",
- "Details":
- "file": "C:\\Users\\user\\AppData\\Local\\Temp\\VBS.vbs"
- "Description": "Creates a copy of itself",
- "Details":
- "copy": "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSWW.exe"
- "Description": "A cryptomining command was executed",
- "Details":
- "command": "cmd /c taskkill /f /im winxmr.exe"
- "command": "cmd /c del /f /a /q C:\\ProgramData\\winxmr.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\winxmr.exe"
- "command": "taskkill /f /im winxmr.exe"
- "Description": "Empties the Recycle Bin, indicative of ransomware",
- "Details":
- "Description": "Uses suspicious command line tools or Windows utilities",
- "Details":
- "command": "cmd /c taskkill /f /im SQLAGENTSZW.exe"
- "command": "cmd /c taskkill /f /im SQLAGENTSLW.exe"
- "command": "cmd /c taskkill /f /im SQLAGENTSKW.exe"
- "command": "cmd /c taskkill /f /im SQLAGENTSJW.exe"
- "command": "cmd /c taskkill /f /im SQLAGENTSHW.exe"
- "command": "cmd /c taskkill /f /im SQLAGENTSGW.exe"
- "command": "cmd /c taskkill /f /im SQLAGENTSFW.exe"
- "command": "cmd /c taskkill /f /im SQLAGENTSEW.exe"
- "command": "cmd /c taskkill /f /im SQLAGENTSDW.exe"
- "command": "cmd /c taskkill /f /im SQLAGENTSCW.exe"
- "command": "cmd /c taskkill /f /im SQLAGENTSBW.exe"
- "command": "cmd /c taskkill /f /im SQLAGENTSAW.exe"
- "command": "cmd /c taskkill /f /im taskmgzr.exe"
- "command": "cmd /c del /f /a /q C:\\ProgramData\\taskmgzr.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\taskmgzr.exe"
- "command": "cmd /c taskkill /f /im ftp.exe"
- "command": "cmd /c taskkill /f /im p.exe"
- "command": "cmd /c del /f /a /q C:\\ProgramData\\winsql.dat"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\winsql.dat"
- "command": "cmd /c taskkill /f /im TQQ.exe"
- "command": "cmd /c del /f /a /q C:\\ProgramData\\TQQ.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\TQQ.exe"
- "command": "cmd /c taskkill /f /im down.exe"
- "command": "cmd /c del /f /a /q C:\\ProgramData\\down.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\down.exe"
- "command": "cmd /c taskkill /f /im MpMgSvc.dll"
- "command": "cmd /c del /f /a /q C:\\ProgramData\\MpMgSvc.dll"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\MpMgSvc.dll"
- "command": "cmd /c taskkill /f /im MS17.exe"
- "command": "cmd /c del /f /a /q C:\\ProgramData\\MS17.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\MS17.exe"
- "command": "cmd /c taskkill /f /im MSSQLL.exe"
- "command": "cmd /c del /f /a /q C:\\ProgramData\\MSSQLL.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\MSSQLL.exe"
- "command": "cmd /c taskkill /f /im TrustedInsteller.exe"
- "command": "cmd /c del /f /a /q C:\\ProgramData\\TrustedInsteller.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\TrustedInsteller.exe"
- "command": "cmd /c taskkill /f /im TQ.exe"
- "command": "cmd /c del /f /a /q C:\\ProgramData\\TQ.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\TQ.exe"
- "command": "cmd /c taskkill /f /im ab2.exe"
- "command": "cmd /c del /f /a /q C:\\ProgramData\\ab2.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\ab2.exe"
- "command": "cmd /c taskkill /f /im ab1.exe"
- "command": "cmd /c del /f /a /q C:\\ProgramData\\ab1.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\ab1.exe"
- "command": "cmd /c taskkill /f /im winxmr.exe"
- "command": "cmd /c del /f /a /q C:\\ProgramData\\winxmr.exe"
- "command": "cmd /c del /f /a /q C:\\RECYCLER\\winxmr.exe"
- "command": "cmd /c taskkill /f /im Rnaphin.exe"
- "command": "cmd /c del /f /a /q %ProgramFiles%\\Microsoft Rntel 2.14.2\\Rnaphin.exe"
- "command": "cmd /c taskkill /f /im taskmgr.exe"
- "command": "taskkill /f /im SQLAGENTSZW.exe"
- "command": "taskkill /f /im SQLAGENTSLW.exe"
- "command": "taskkill /f /im SQLAGENTSKW.exe"
- "command": "taskkill /f /im SQLAGENTSJW.exe"
- "command": "taskkill /f /im SQLAGENTSHW.exe"
- "command": "taskkill /f /im SQLAGENTSGW.exe"
- "command": "taskkill /f /im SQLAGENTSFW.exe"
- "command": "taskkill /f /im SQLAGENTSEW.exe"
- "command": "taskkill /f /im SQLAGENTSDW.exe"
- "command": "taskkill /f /im SQLAGENTSCW.exe"
- "command": "taskkill /f /im SQLAGENTSBW.exe"
- "command": "taskkill /f /im SQLAGENTSAW.exe"
- "command": "taskkill /f /im taskmgzr.exe"
- "command": "taskkill /f /im ftp.exe"
- "command": "taskkill /f /im p.exe"
- "command": "taskkill /f /im TQQ.exe"
- "command": "taskkill /f /im down.exe"
- "command": "taskkill /f /im MpMgSvc.dll"
- "command": "taskkill /f /im MS17.exe"
- "command": "taskkill /f /im MSSQLL.exe"
- "command": "taskkill /f /im TrustedInsteller.exe"
- "command": "taskkill /f /im TQ.exe"
- "command": "taskkill /f /im ab2.exe"
- "command": "taskkill /f /im ab1.exe"
- "command": "taskkill /f /im winxmr.exe"
- "command": "taskkill /f /im Rnaphin.exe"
- "command": "taskkill /f /im taskmgr.exe"
- * Started Service:
- * Mutexes:
- "Local\\ZoneAttributeCacheCounterMutex",
- "Local\\ZonesCacheCounterMutex",
- "Local\\ZonesLockedCacheCounterMutex",
- "Global\\ADAP_WMI_ENTRY",
- "Global\\RefreshRA_Mutex",
- "Global\\RefreshRA_Mutex_Lib",
- "Global\\RefreshRA_Mutex_Flag"
- * Modified Files:
- "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSWW.exe",
- "C:\\Users\\user\\AppData\\Local\\Temp\\VBS.vbs",
- "C:\\Windows\\appcompat\\Programs\\RecentFileCache.bcf",
- "C:\\Windows\\SoftwareDistribution\\DataStore\\DataStore.edb",
- "C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\edb.chk"
- * Deleted Files:
- "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSZW.exe",
- "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSLW.exe",
- "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSKW.exe",
- "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSJW.exe",
- "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSHW.exe",
- "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSGW.exe",
- "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSFW.exe",
- "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSDW.exe",
- "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSCW.exe",
- "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSBW.exe",
- "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTSAW.exe",
- "C:\\Users\\user\\AppData\\Local\\Temp\\AutoRunApp.vbs",
- "C:\\Users\\user\\AppData\\Local\\Temp\\VBS.vbs",
- "C:\\Users\\user\\AppData\\Local\\Temp\\config.json",
- "C:\\Users\\user\\AppData\\Local\\Temp\\CPU_\\xef\\xbe\\xb2\\xef\\xbf\\x8e\\xef\\xbf\\x8a\\xef\\xbf\\xbd.txt",
- "C:\\Users\\user\\AppData\\Local\\Temp\\NVDIA_\\xef\\xbe\\xb2\\xef\\xbf\\x8e\\xef\\xbf\\x8a\\xef\\xbf\\xbd.txt",
- "C:\\Users\\user\\AppData\\Local\\Temp\\AMD_\\xef\\xbe\\xb2\\xef\\xbf\\x8e\\xef\\xbf\\x8a\\xef\\xbf\\xbd.txt",
- "C:\\ProgramData\\taskmgzr.exe",
- "C:\\RECYCLER\\taskmgzr.exe",
- "C:\\ProgramData\\winsql.dat",
- "C:\\RECYCLER\\winsql.dat",
- "C:\\ProgramData\\TQQ.exe",
- "C:\\RECYCLER\\TQQ.exe",
- "C:\\ProgramData\\down.exe",
- "C:\\RECYCLER\\down.exe",
- "C:\\ProgramData\\MpMgSvc.dll",
- "C:\\RECYCLER\\MpMgSvc.dll",
- "C:\\ProgramData\\MS17.exe",
- "C:\\RECYCLER\\MS17.exe",
- "C:\\ProgramData\\MSSQLL.exe",
- "C:\\RECYCLER\\MSSQLL.exe",
- "C:\\ProgramData\\TrustedInsteller.exe",
- "C:\\RECYCLER\\TrustedInsteller.exe",
- "C:\\ProgramData\\TQ.exe",
- "C:\\RECYCLER\\TQ.exe",
- "C:\\ProgramData\\ab2.exe",
- "C:\\RECYCLER\\ab2.exe",
- "C:\\ProgramData\\ab1.exe",
- "C:\\RECYCLER\\ab1.exe",
- "C:\\ProgramData\\winxmr.exe",
- "C:\\RECYCLER\\winxmr.exe",
- "C:\\Users\\user\\AppData\\Local\\Temp\\%ProgramFiles%\\Microsoft Rntel 2.14.2\\Rnaphin.exe",
- "C:\\Users\\user\\AppData\\Local\\Tempsysermad.exe",
- "C:\\Users\\user\\AppData\\Local\\TempXMRig.exe",
- "C:\\Users\\user\\AppData\\Local\\TempXMR.exe",
- "C:\\Users\\user\\AppData\\Local\\Temptaobao.exe",
- "C:\\Users\\user\\AppData\\Local\\Tempchrom.exe",
- "C:\\Users\\user\\AppData\\Local\\Tempchromes.exe",
- "C:\\Users\\user\\AppData\\Local\\TempMiner.exe",
- "C:\\Users\\user\\AppData\\Local\\Tempm6.exe",
- "C:\\Users\\user\\AppData\\Local\\Tempm7.exe",
- "C:\\Users\\user\\AppData\\Local\\Tempmyssssql.exe",
- "C:\\Users\\user\\AppData\\Local\\Temptaskmgr.exe",
- "C:\\Users\\user\\AppData\\Local\\Tempcpu.exe",
- "C:\\Users\\user\\AppData\\Local\\Tempx6.exe",
- "C:\\Users\\user\\AppData\\Local\\Tempwin64.exe",
- "C:\\Users\\user\\AppData\\Local\\Tempwin32.exe",
- "C:\\Users\\user\\AppData\\Local\\Tempvip.exe",
- "C:\\Users\\user\\AppData\\Local\\Tempvpn.exe",
- "C:\\Users\\user\\AppData\\Local\\Temp370.exe",
- "C:\\Users\\user\\AppData\\Local\\TempaIg.exe",
- "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTC.exe",
- "C:\\Users\\user\\AppData\\Local\\Temp\\CPU_log1.txt",
- "C:\\Users\\user\\AppData\\Local\\Temp\\CPU_log.txt",
- "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTN.exe",
- "C:\\Users\\user\\AppData\\Local\\Temp\\N_log1.txt",
- "C:\\Users\\user\\AppData\\Local\\Temp\\N_log.txt",
- "C:\\Users\\user\\AppData\\Local\\Temp\\SQLAGENTA.exe",
- "C:\\Users\\user\\AppData\\Local\\Temp\\A_log1.txt",
- "C:\\Users\\user\\AppData\\Local\\Temp\\A_log.txt",
- "C:\\Windows\\SoftwareDistribution\\DataStore\\Logs\\edbtmp.log"
- * Modified Registry Keys:
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\Run",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\Run\\ADSL Dial",
- "HKEY_CURRENT_USER\\Software\\Classes\\Local Settings\\MuiCache\\2F\\52C64B7E\\LanguageList",
- "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\UNCAsIntranet",
- "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\AutoDetect"
- * Deleted Registry Keys:
- "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\ProxyBypass",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\ProxyBypass",
- "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\IntranetName",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\IntranetName"
- * DNS Communications:
- "type": "A",
- "request": "x.nxxxn.ga",
- "answers":
- "type": "A",
- "request": "c.xzzzx.ga",
- "answers":
- * Domains:
- "ip": "185.172.66.203",
- "domain": "x.nxxxn.ga"
- "ip": "156.238.3.105",
- "domain": "c.xzzzx.ga"
- * Network Communication - ICMP:
- * Network Communication - HTTP:
- * Network Communication - SMTP:
- * Network Communication - Hosts:
- "country_name": "Germany",
- "ip": "185.172.66.203",
- "inaddrarpa": "",
- "hostname": ""
- * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement