Trojan.Coinminer.GQ
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 5,763 |
| Threat Level: | 80 % (High) |
| Infected Computers: | 5,269 |
| First Seen: | September 3, 2021 |
| Last Seen: | April 13, 2026 |
| OS(es) Affected: | Windows |
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.Coinminer.GQ |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
e1f45c54111a4593371c1d56a0e256fd
SHA1:
00149ae29e2a67d46db39185f29d6000a2761680
File Size:
159.74 KB, 159744 bytes
|
|
MD5:
0c7d0f0c88ee79d4ef5b7de840b1914e
SHA1:
4a2319b72bbb5d0fa8d6c711df29696743ee6713
File Size:
159.23 KB, 159232 bytes
|
|
MD5:
2deba8988326e7ce2671a8a1acadddc4
SHA1:
ab836c1c9f19b9703fe6bcd4b185078f089c56fe
File Size:
144.90 KB, 144896 bytes
|
|
MD5:
31f70ef11d84155de959224ab09f803a
SHA1:
4f7c178a458a8bacb45289b2c6ef8f3933289efb
SHA256:
F4CAFB0690A34B3AE1B8AA45C06933951B524B5623A0C0018F71269F4331B0CF
File Size:
168.96 KB, 168960 bytes
|
|
MD5:
922b4fc67052a03d72492caae2b8a1b0
SHA1:
a20c416f6436fe5b8c10eee95b018c786dae7d16
SHA256:
7A6B7682A1B6F8ED93FBD22965C84012FC0D36AABEA1DD590987057465B8365A
File Size:
161.79 KB, 161792 bytes
|
Show More
|
MD5:
159fd44d2295135dfd7b7d3260ab274c
SHA1:
4bda58f81364d526d0644a8640cbe3e474aed039
SHA256:
614393462F76BC91C324FD770776F4DA4F5C76E71F5D2CFC6ACF7DA5E9204F95
File Size:
160.77 KB, 160768 bytes
|
|
MD5:
7349546c112da6e0a5c26df480804090
SHA1:
5dceecf961e80cefc8c7761662b8025671895185
SHA256:
350218BEFF126F230A3B8F8111B016AB593913FC6B3932D56E1F76A8989C61FF
File Size:
160.26 KB, 160256 bytes
|
|
MD5:
7368f9d1351dbd88884769a9e1591d58
SHA1:
2b5f466fd47ee9405a22059dd2885e5cb827027b
SHA256:
398F86519E5CCFC875EEFF3B8BC6DC7678D62A952AFAFC77A545BF4243621BF5
File Size:
158.21 KB, 158208 bytes
|
|
MD5:
78d89c701d2ba3cd90083280fc1fc696
SHA1:
509ecf8013f055c8b79c034be7f03ef9b3a2783e
SHA256:
B319A4C8455BFDE9CA05342F35842C0AFC4AF016B9552D458B5AF76F8E51321B
File Size:
158.21 KB, 158208 bytes
|
|
MD5:
15807623d3273fe368fffb85d6128e73
SHA1:
255d31822d031be2ccbc45a0f22ec2f9787e746c
SHA256:
DF1DA6BF58171512023D8CAA06271A8B00339D9FD108B9112CD3BDFB8AD7881F
File Size:
160.26 KB, 160256 bytes
|
|
MD5:
0f44f00339fa9293e84f6b34fca7359d
SHA1:
75cd6fe5fa5bfd477bcd6473eb71edd013643366
SHA256:
B130341B32EE6551581D33A7A01D4D25B59725FEF7FB5D821EE46FE72081C141
File Size:
158.21 KB, 158208 bytes
|
|
MD5:
0705de62402bf0936f08c0f14bb26539
SHA1:
456af6759e1072e999b8d5fbadc2153d1ece771d
SHA256:
D986700EBC8388B4715CC6767E0B550860B110A6DA21B841CD647BDF5FED2CA2
File Size:
100.35 KB, 100352 bytes
|
|
MD5:
60db68e1d9365eef18636cb2d7b6ec6d
SHA1:
2b76d353a5c4d2ba2ae5f25a6c0d02a268302956
SHA256:
D09188841F6166DBE35457D288060AD22B44E930F33AB49DDE045DE805756B8A
File Size:
159.74 KB, 159744 bytes
|
|
MD5:
d95b92dec1b0bfbcf980c2f0aa4b0ad5
SHA1:
2f310a58a25f3cb191b5913d091ffc59ab15ed65
SHA256:
26F1F1A85F33F8D0E15FB86DA996997AB5E92C2D49A95B1299680B53FD4A2EF5
File Size:
168.96 KB, 168960 bytes
|
|
MD5:
fd0e99a46948a805968aebece667ba8b
SHA1:
ad453ec37da0fefee71381f8f0ba166ed275acb4
SHA256:
08FD7E9D9EF526807CACA0F83C33C1B60CB7781630F81015F59F947D6A8BB5D5
File Size:
157.70 KB, 157696 bytes
|
|
MD5:
e01385a5a35922814336b6c1d1288a2b
SHA1:
6a3ff72c508fd988b8e4bf8e0ce702875e66c9a6
SHA256:
A0EABC8450DBB16AD25E3C54327E63404916FA66D2F1D4E5CFCCA44962F59C19
File Size:
151.55 KB, 151552 bytes
|
|
MD5:
0e492c70df68405f39cffc91aa21dce9
SHA1:
73c2d71db0182b9230617d6edc1d8b0b82fdc28e
SHA256:
BD7531CE57D96813FC8EC1F1AA7ACADE3FCB7F73B1421CF70073B34343EEE310
File Size:
162.30 KB, 162304 bytes
|
|
MD5:
e8bd24b22cf13350b7c054da1ae042bd
SHA1:
6b69046f29332d67c10f5d7731e7e280f190f862
SHA256:
C3B429E5558450AED6ADA2C2AC93B1823165B3A294C100F1348BF403210997E2
File Size:
171.01 KB, 171008 bytes
|
|
MD5:
b7c385a103e12cea18597d2c2166930f
SHA1:
66d233da8a0abb5d7ab46446311043d0bbfa5029
SHA256:
CAD229D80F942BB08D3F685A0BA4FE980A74AC25FEF7F823C2D8DDC1246E4042
File Size:
157.70 KB, 157696 bytes
|
|
MD5:
99c904a4f5a0d0cb499ae22966ab628e
SHA1:
fc9d12ed1151a23f30986fe6252310bc0719ae8a
SHA256:
2161C02F3B88DAC5F40EFAF8611BACE456667CBB9501CD85C13A2F020BB24D1C
File Size:
97.79 KB, 97792 bytes
|
|
MD5:
ddb23408c7c2c26921f9195c423d9f83
SHA1:
22c80e7c94212e40da07d3f25bcfe529d7dd03d3
SHA256:
6C7FEDA7C6BB1A0334C4C8FD980B1CBA7A08F17F2BB36EBF10F631C54B645BC7
File Size:
160.26 KB, 160256 bytes
|
|
MD5:
4f59d00ab6df9067678d8a316d5d6d66
SHA1:
c237bb01a35c78bfdcbeb63f04ce6219662fc9a5
SHA256:
CEC6F9755671683CD5A6188CB49485E01690A158726DADF2E72FFC7BED68F512
File Size:
171.01 KB, 171008 bytes
|
|
MD5:
cb409a68f6db64bec452a0ebeed0f6cd
SHA1:
ccaa9cdbef020d15f420e39c53fe019a2734df24
SHA256:
7DF11DCBC322F8F7C81BD3A8657E12425FB595984232EB37B52B0212FE14B85A
File Size:
162.30 KB, 162304 bytes
|
|
MD5:
8860d9357c4a4ef7f1717d37f95c84a2
SHA1:
6974efbd7784ede95449ce015eef3096dd1b198f
SHA256:
0A46FFE1D88386D2355799132C5C917A6D2D047210BDB360F65D556AD455A898
File Size:
157.70 KB, 157696 bytes
|
|
MD5:
a9136991afb2167fc14cdd2a8129852d
SHA1:
31302fbfd3d3b8ad8ea37bbfbe4507334e3b429d
SHA256:
EC8054ACE4BE98668F143E0E996E323ADFB535030E7B65BA65627A3991DD49D0
File Size:
160.26 KB, 160256 bytes
|
|
MD5:
e85cd300ab009899f2edb817d88c9a7b
SHA1:
101e5e8e289bb0f6b11fbaa53fb59beb6c6a5d2a
SHA256:
C2763351E28291394605E1643C3828632F7E9D2D513A0B182FCC151FD8B1E286
File Size:
158.21 KB, 158208 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have exports table
- File doesn't have security information
- File is 64-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Company Name |
|
| Company Short Name | Microsoft |
| File Description |
|
| File Version |
|
| Internal Name |
|
| Last Change | 1f7a1d165042010b399db54bd56390dd47e15013 |
| Legal Copyright |
|
| Official Build | 1 |
| Original Filename |
|
| Product Name |
|
| Product Short Name | Microsoft Edge |
| Product Version |
|
File Traits
- CAB SFX
- Wextract
- x64
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 92 |
|---|---|
| Potentially Malicious Blocks: | 38 |
| Whitelisted Blocks: | 54 |
| Unknown Blocks: | 0 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Coinminer.GQ
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe | Generic Read,Write Attributes |
| \device\namedpipe | Generic Write,Read Attributes |
| \device\namedpipe\dav rpc service | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| \device\namedpipe\pshost.133968238621902896.4288.defaultappdomain.powershell | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134068534055850207.1864.defaultappdomain.powershell | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134205720658483254.7736.defaultappdomain.powershell | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\wkssvc | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\microsoft\windows\powershell\startupprofiledata-noninteractive | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_3vr221as.udu.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_4rdkcnyp.h2t.psm1 | Generic Write,Read Attributes |
Show More
| c:\users\user\appdata\local\temp\__psscriptpolicytest_b2ieakdb.wwq.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_etitmhro.03w.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_gwxwqslz.pu4.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_od325ckn.0fn.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_svrfd35s.au2.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_szdwsbid.bh5.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\2nd keyboard delay.bat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\2nd keyboard delay.bat | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\amir.bat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\amir.bat | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\amir.bat_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\anything - copy (2).bat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\anything - copy (2).bat | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\anything - copy (2).bat_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\bypass 077.bat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\bypass 077.bat | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\change~1.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\change~1.ps1 | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\change~1.ps1_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\father.bat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\father.bat | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\firewall.bat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\firewall.bat | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\firewall.bat_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\limpiador.bat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\limpiador.bat | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\limpiador.bat_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\makefiles.bat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\makefiles.bat | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\makefiles.bat_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\modular.bat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\modular.bat | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\modular.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\modular.ps1 | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\plus.cmd | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\plus.cmd | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\prohackerterminal.bat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\prohackerterminal.bat | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\roblox - copy - copy.bat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\roblox - copy - copy.bat | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\roblox - copy - copy.bat_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\selecto.cmd | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\selecto.cmd | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\test - copy (37) - copy.vbs | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\test - copy (37) - copy.vbs | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\test - copy (37) - copy.vbs_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\tmp4351$.tmp | Generic Write,Read Attributes,Delete |
| c:\users\user\appdata\local\temp\ixp000.tmp\tweaks hub bloom reducer.bat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\tweaks hub bloom reducer.bat | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\updatenxlicense.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\updatenxlicense.ps1 | Synchronize,Write Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKLM\software\microsoft\windows\currentversion\runonce::wextract_cleanup0 | rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Saauwwqn\AppData\Local\Temp\IXP000.TMP\" | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 蹲㧛Ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 㧝Ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows\currentversion\runonce::wextract_cleanup0 | rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Mzcanjjd\AppData\Local\Temp\IXP000.TMP\" | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 뤈鋉Ǜ | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\applicationassociationtoasts::cplfile_.cpl | RegNtPreCreateKey | |
| HKCU\local settings\software\microsoft\windows\shell\muicache::c:\windows\system32\control.exe.friendlyappname | Windows Control Panel | RegNtPreCreateKey |
| HKCU\local settings\software\microsoft\windows\shell\muicache::c:\windows\system32\control.exe.applicationcompany | Microsoft Corporation | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey |
Show More
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\explorer\userassist\{cebff5cd-ace2-4f4f-9178-9926f41749ea}\count::zvpebfbsg.jvaqbjf.rkcybere | % Ĵ 銅¹ 뾀 뾀 뾀 뾀 뾀 뾀 뾀 뾀 뾀 뾀䠀鑂Ǜ | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\explorer\userassist\{cebff5cd-ace2-4f4f-9178-9926f41749ea}\count::hrzr_pgyfrffvba | ǐ 罿ѻ| Microsoft.XboxGamingOverlay_8wekyb3d8bbwe!App | RegNtPreCreateKey |
| HKLM\software\microsoft\windows\currentversion\runonce::wextract_cleanup0 | rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Zqppfewu\AppData\Local\Temp\IXP000.TMP\" | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 媖䇑ᝆǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows\currentversion\runonce::wextract_cleanup0 | rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Mngkdvyj\AppData\Local\Temp\IXP000.TMP\" | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 湫⛋ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 灲⛋ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows\currentversion\runonce::wextract_cleanup0 | rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Clxnptqo\AppData\Local\Temp\IXP000.TMP\" | RegNtPreCreateKey |
| HKLM\software\microsoft\windows\currentversion\runonce::wextract_cleanup0 | rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Ekiywvap\AppData\Local\Temp\IXP000.TMP\" | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ⽡짰䵼ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | ⽡짰䵼ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows\currentversion\runonce::wextract_cleanup0 | rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Gvmpsikw\AppData\Local\Temp\IXP000.TMP\" | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 쌴亟ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows\currentversion\runonce::wextract_cleanup0 | rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Rlmtbysr\AppData\Local\Temp\IXP000.TMP\" | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 䊷䐒烪ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | ꏆ䐔烪ǜ | RegNtPreCreateKey |
| HKCU\local settings\muicache\1b\52c64b7e::@c:\windows\system32\ndfapi.dll,-40001 | Windows Network Diagnostics | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows\currentversion\runonce::wextract_cleanup0 | rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Legawaha\AppData\Local\Temp\IXP000.TMP\" | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 괧沨紵ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 玶沭紵ǜ | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\explorer::slowcontextmenuentries | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\content::cacheprefix | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\cookies::cacheprefix | Cookie: | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\history::cacheprefix | Visited: | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows\currentversion\runonce::wextract_cleanup0 | rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Rsmrzxsy\AppData\Local\Temp\IXP000.TMP\" | RegNtPreCreateKey |
| HKLM\software\microsoft\windows\currentversion\runonce::wextract_cleanup0 | rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Iifoerna\AppData\Local\Temp\IXP000.TMP\" | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 鱸赻鞦ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | ﺴ赽鞦ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 澠跰鞦ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows\currentversion\runonce::wextract_cleanup0 | rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Ubcerfsq\AppData\Local\Temp\IXP000.TMP\" | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ళ铝ꌸǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 灂铟ꌸǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows\currentversion\runonce::wextract_cleanup0 | rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Gewgvuwd\AppData\Local\Temp\IXP000.TMP\" | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | ↙剓쭤ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 莱剕쭤ǜ | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
202 additional items are not displayed above. |
| Process Shell Execute |
|
| Anti Debug |
|
| User Data Access |
|
| Encryption Used |
|
| Other Suspicious |
|
| Process Terminate |
|
| Process Manipulation Evasion |
|
| Network Info Queried |
|
| Network Winsock2 |
|
| Network Winsock |
|
| Network Icmp |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
cmd.exe /c father.bat
|
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Start-Process -WindowStyle Hidden -FilePath powershell -Verb RunAs -ArgumentList '-NoProfile -Command Add-MpPreference -ExclusionPath \"C:\Users\Saauwwqn\*\"
|
cmd /c "firewall.bat"
|
WriteConsole:
|
WriteConsole: C:\Users\Mzcanjj
|
Show More
WriteConsole: start
|
WriteConsole: C:\Windows\Syst
|
C:\Windows\System32\Firewall.cpl C:\Windows\System32\firewall.cpl
|
open %SystemRoot%\system32\rundll32.exe Shell32.dll,Control_RunDLL "C:\Windows\System32\Firewall.cpl",
|
C:\Users\Zqppfewu\AppData\Local\Temp\IXP000.TMP\Plus.cmd
|
C:\WINDOWS\system32\taskkill.exe taskkill /IM "Consult4.exe" /IM "MCD3 Diagnostic Tool.exe" /IM "ErrorReportingTool.exe" /F
|
WriteConsole: ERROR: CoInitial
|
C:\WINDOWS\system32\regsvr32.exe regsvr32 /u /s "C:\CONSULT-III_plus\System\Middleware\Nissan\DDriver\Bin\D-Driver.dll"
|
cmd /c amir.bat
|
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe PowerShell -NoProfile -ExecutionPolicy Bypass -File "ChangeWallpaperAndIcons.ps1"
|
WriteConsole: The argument 'Ch
|
WriteConsole:
|
WriteConsole: Windows PowerShe
|
cmd /c ChangeWallpapersAndIcons.ps1
|
WriteConsole: 'ChangeWallpaper
|
Command.com /c C:\Users\Clxnptqo\AppData\Local\Temp\IXP000.TMP\Limpiador.bat
|
cmd /c "Tweaks Hub Bloom Reducer.bat"
|
WriteConsole: Tweaks Hub Bloom
|
WriteConsole: ================
|
WriteConsole: 1. Toggle Bloom
|
WriteConsole: 2. Toggle Privat
|
WriteConsole: 3. Toggle BCD Tw
|
WriteConsole: 4. Toggle FPS Ca
|
WriteConsole: 5. Toggle Input
|
WriteConsole: 6. Toggle Mouse
|
WriteConsole: 7. Toggle Fast M
|
WriteConsole: 8. Exit
|
WriteConsole: Choose an option
|
powershell.exe -ExecutionPolicy Bypass -File "UpdateNXLicense.ps1"
|
cmd /c "Roblox - Copy - Copy.bat"
|
WriteConsole: C:\Users\Rlmtbys
|
WriteConsole: for
|
WriteConsole: /
|
WriteConsole: %a in
|
WriteConsole: ("D:\Onlinegames
|
WriteConsole: set
|
WriteConsole: "rootdir=%a"
|
WriteConsole: /d "" RobloxPla
|
WriteConsole: The system canno
|
cmd /c makefiles.bat
|
WriteConsole: C:\Users\Legawah
|
WriteConsole: beamng:zeitScre
|
C:\Users\Legawaha\AppData\Local\Temp\IXP000.TMP\beamng:\zeitScreenBuild:zeit_zeitScreenUtils.beginTimer() beamng:zeitScreenBuild:zeit_zeitScreenUtils.beginTimer()
|
WriteConsole: Access is denied
|
C:\Users\Legawaha\AppData\Local\Temp\IXP000.TMP\beamng:\zeitScreenBuild:zeit_zeitScreenUtils.endTimer([[TOOK]]) beamng:zeitScreenBuild:zeit_zeitScreenUtils.endTimer([[TOOK]])
|
Command.com /c C:\Users\Rsmrzxsy\AppData\Local\Temp\IXP000.TMP\anything - Copy (2).bat
|
cmd /c "ProHackerTerminal.bat"
|
C:\WINDOWS\system32\mode.com mode 120,40
|
C:\WINDOWS\system32\ipconfig.exe ipconfig
|
C:\WINDOWS\system32\findstr.exe findstr /i "IPv4"
|
WriteConsole: Initializing Hac
|
C:\WINDOWS\system32\PING.EXE ping localhost -n 2
|
WriteConsole: ce93c3bbc3aace93c3bbc3aace93c3bb
|
C:\WINDOWS\system32\PING.EXE ping localhost -n 1
|
WriteConsole: ce93c3bbc3aace93c3bbc3aace93c3b2
|
WriteConsole: ce93c3b2c39cce93c3b2c389ce93c3b2
|
WriteConsole: WELCOME,
|
WriteConsole: Local IP
|
C:\WINDOWS\system32\PING.EXE ping localhost -n 3
|
WriteConsole: [*] Connecting t
|
WriteConsole: [*] Bypassing fi
|
WriteConsole: [*] Exploiting p
|
WriteConsole: [*] Injecting pa
|
WriteConsole: [*] Access Grant
|
WriteConsole: ----------------
|
WriteConsole: [1] Show System
|
WriteConsole: [2] Show Network
|
WriteConsole: [3] Show Active
|
WriteConsole: [4] Ping Google
|
WriteConsole: [5] Show Folder
|
WriteConsole: [6] Matrix Effec
|
WriteConsole: [7] Fake Virus S
|
WriteConsole: [8] Fake Hacking
|
WriteConsole: [0] Exit
|
WriteConsole: Enter your choic
|
cmd /c "bypass 077.bat"
|
WriteConsole:
|
WriteConsole: :
|
WriteConsole: . ::
|
WriteConsole: .-''---
|
WriteConsole: '. ..-::
|
WriteConsole: '.' :::
|
WriteConsole: ::
|
WriteConsole: Press any key to
|
WriteConsole: +--------------
|
WriteConsole: "
|
WriteConsole: "
|
WriteConsole: CHOOSE AN OPTION
|
cmd /c "2nd Keyboard Delay.bat"
|
WriteConsole: C:\Users\Gewgvuw
|
WriteConsole: by
|
WriteConsole: SWA Tweaks
|
WriteConsole: 'by' is not reco
|
C:\WINDOWS\system32\net.exe NET SESSION
|
WriteConsole: Requesting admin
|
C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Start-Process 'C:\WINDOWS\system32\cmd.exe' -ArgumentList '/c "2nd Keyboard Delay.bat"' -Verb RunAs"
|