Trojan.Kryptik.YFH
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.Kryptik.YFH |
|---|---|
| Signature status: | Hash Mismatch |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
0765bb25d622e5e67cc6b1d8663ee559
SHA1:
7bc6ff1d458d9974cf00a38b32fde78b91085f51
File Size:
5.02 MB, 5022496 bytes
|
|
MD5:
b2ef8724ac686fe6d1a4087a339f8517
SHA1:
5df130f24e399aaf8f21b6ef06318b6dde76d802
File Size:
5.00 MB, 5000480 bytes
|
|
MD5:
1bc50842b2e0fe50a95deb643dd2412d
SHA1:
f13bee29ce428446651512c7a68a4e81823c4fac
File Size:
5.02 MB, 5022496 bytes
|
|
MD5:
57b1e4da5857f676698eec1d9e7db2c8
SHA1:
8d7531de0da82213053f5289d2500c4a506866c3
File Size:
5.09 MB, 5088032 bytes
|
|
MD5:
7c05acfc493de694f718efe9c8e02a0d
SHA1:
3d922b92b3f8afab7555df952fef9e5cfa979f05
File Size:
5.43 MB, 5433120 bytes
|
Show More
|
MD5:
c747f8fddc66d4980e5317f083005f33
SHA1:
090e08eeb889e68743282820148a2dff0002288b
File Size:
4.93 MB, 4931872 bytes
|
|
MD5:
ce5c0406be7ad13835fd9cba5a84e8b1
SHA1:
4941233928d0b594bfdcd9791067e91e3f204711
File Size:
4.96 MB, 4955424 bytes
|
|
MD5:
14edb9d4c874d59bdf11bd0a2bf7e8b4
SHA1:
2fb77a32538b2f5d98eba41e9aed232662e3ef69
File Size:
4.96 MB, 4955424 bytes
|
|
MD5:
f992854a7b9c6a3f08f22360b5c123e2
SHA1:
34ba8260aebe9968b0c8a3dd51306ba6c47dd1df
File Size:
5.02 MB, 5022496 bytes
|
|
MD5:
d91ff2952797588959e7c70351a3a69b
SHA1:
832e7761df77bde96e2591fca710c53cadcfc002
File Size:
5.06 MB, 5064992 bytes
|
|
MD5:
ab9196051319f596f19acc0301c8f753
SHA1:
404495e2abfaf3542075b40360efdeb00cacdffa
File Size:
5.14 MB, 5136672 bytes
|
|
MD5:
82530ee0068e4a7342d13e7e3c8e0ccf
SHA1:
38403293f28e0345a2a2f42e7415aadadfaa90bd
File Size:
5.14 MB, 5136672 bytes
|
|
MD5:
6350494383ac2a177cb65e96684d5202
SHA1:
6aa98dad4c76d8bc5714b056a17a214c3b834039
File Size:
5.09 MB, 5088032 bytes
|
|
MD5:
7d180791cf1e7b15fa6c9ea8beeefd65
SHA1:
d3bdf3b99dbec1281df11a19fd6b93162d62a76c
File Size:
4.96 MB, 4955424 bytes
|
|
MD5:
f4e7d6430d1730c50c7a45751ff52c3e
SHA1:
150d4349d1c5496f2706675b6715fc13b2a232b2
File Size:
4.95 MB, 4952352 bytes
|
|
MD5:
74f10d2f573b00b75e560c1ac52ab86e
SHA1:
d1bb4a9e5302607ca3e285ee560a97163731eeae
File Size:
4.95 MB, 4952352 bytes
|
|
MD5:
31a36b33ef5616db01c2dace82389e09
SHA1:
9441c659c719483f9d79c3ea2e465bc32e71fff6
File Size:
4.95 MB, 4952352 bytes
|
|
MD5:
4e5bb5ca4e0d0c29ec98678b82721802
SHA1:
90a6d4ab1df41efe035277d3bfedb15625ddd7c8
File Size:
6.29 MB, 6286077 bytes
|
|
MD5:
4dc4b795ecaf237c23e6fcf76094145d
SHA1:
1ba1f5517838beffc66cb62d4f5d0cca72c3be25
File Size:
3.36 MB, 3364640 bytes
|
|
MD5:
789d917d99f94aac3460c04dea15ebfa
SHA1:
aab9d1935667946e0d90d8713772ee3efd04b229
SHA256:
8C956F6EC00ECCB3512E92C0BFD28D9FF7E0FCDC9C7602B096686613AB235B1C
File Size:
3.37 MB, 3366176 bytes
|
|
MD5:
137c451230f444c9eda2c61c83d3daa8
SHA1:
97029f161140668d6ffd536c09fb954943c7dfd7
SHA256:
AA17571FE8B830CAF2C7A7B220035D4D7503869E5DF18EDEEEDC91A0CE393A3A
File Size:
3.65 MB, 3648800 bytes
|
|
MD5:
90ae9ea4403cc0cf5c92af2d3d82c7e3
SHA1:
c597515b70d6e9e0c9619b178e2d1d1dd103d23e
SHA256:
353BB7FF551CC81D11DD41B3AC03084AB2CE72A86099A6010A9AC5D6A67CC5D0
File Size:
3.53 MB, 3527968 bytes
|
|
MD5:
10422d2677e367748f4400658bb33b07
SHA1:
cdb19fa7705b1f69ad026c39a201ea9d4ac081b6
SHA256:
182CABB9FB3A501120711B22EFFC1A8F859624E1861DFD2F5900EC39F9076D47
File Size:
3.65 MB, 3648800 bytes
|
|
MD5:
0f8d091e8245f53264858e4f0196c542
SHA1:
93841de69300c8280d35483d1672f8e35ba587a4
SHA256:
3BB2838F2D0E039529697D0F1D0A8915B62A676B2E2460FFEDECF4B230DE177A
File Size:
3.65 MB, 3653408 bytes
|
|
MD5:
88f53b6a8686b5389ce852ed714fe58b
SHA1:
7430ef976c16d5a3646773ff94bf11d09a70c4d4
SHA256:
B05E9110E53373D9A619E933A68EF5D5F03446F7B0435DBE708836CF550B6C62
File Size:
5.09 MB, 5088032 bytes
|
|
MD5:
3288ced938a5ddab4258b72494893094
SHA1:
049c0a18f94715e332861ac5065efcf1f393264a
SHA256:
DD717FCB7D845A4BB7E0380A9DF665219B9B2DE29CA8A12600C52F831069F1B3
File Size:
5.14 MB, 5136672 bytes
|
|
MD5:
5de20fb299d935ec1f4f9ca4e42bf2e1
SHA1:
d893ea470afde96b96d67c04487d2e40cbfd300b
SHA256:
E19D26C91D02DDF021ED5DCC087062685A8EA49778CFDE4876BC2489284E796F
File Size:
5.01 MB, 5014816 bytes
|
|
MD5:
976bbf5c29a4f2b2b1a30574fc8bd126
SHA1:
5a7e108ef9d5305277542363718c011f97d9e80c
SHA256:
6090CEAF893A4400B46EF355550F22C536060C26880263B70C428D49D9A46BF9
File Size:
4.93 MB, 4931872 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have security information
- File has exports table
- File has TLS information
- File is 32-bit executable
- File is 64-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
Show More
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| File Version | 1.0.0.0 |
| Product Version | 1.0.0.0 |
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| Corel Corporation | VeriSign Class 3 Code Signing 2004 CA | Hash Mismatch |
File Traits
- HighEntropy
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 1,938 |
|---|---|
| Potentially Malicious Blocks: | 2 |
| Whitelisted Blocks: | 1,936 |
| Unknown Blocks: | 0 |
Visual Map
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
0
x
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Agent.GDFI
- Agent.OGW
- BHO.X
- Banker.JBA
- Banker.TH
Show More
- Banload.XB
- Banload.XG
- Banload.XK
- Brute.LBA
- Chinflej.A
- Dapato.ACB
- Dapato.AG
- Dapato.AH
- Delf.UC
- Delf.XA
- Delf.XB
- FareIt.AT
- Graftor.BE
- Graftor.BK
- Injector.DFF
- Injector.DGB
- Injector.EU
- Injector.FGGA
- Injector.FGHA
- Injector.FGSA
- Injector.FHBA
- Injector.FHBB
- Injector.FHBC
- Injector.FHBD
- Injector.FHBE
- Injector.FHE
- Injector.GDSA
- Injector.GSB
- Injector.GSD
- Injector.HDFB
- Injector.KDF
- Injector.KDG
- Injector.KFF
- Injector.KFR
- Injector.KFZ
- Injector.KI
- Injector.KKC
- Injector.KKF
- Injector.KPA
- Injector.KS
- Injector.KZP
- Injector.PMB
- Kryptik.GSJ
- Kryptik.YFH
- Nanobot.FB
- Nanocore.GA
- Nussamoc.A
- Sadenav.B
- Sckeylog.C
- StartPage.AJ
- Startpage.GA
- Startpage.LA
- Stealer.JB
- Stealer.MA
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe | Generic Read,Write Attributes |
| \device\namedpipe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\rarsfx0 | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\__tmp_rar_sfx_access_check_113062 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\rarsfx0\mas_aio.cmd | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\mas_aio.cmd | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\soft.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\soft.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\svc61e7.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\svc856b.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
Show More
| c:\users\user\appdata\local\temp\svchost015.exe | Read Data,Read Attributes,Synchronize,Write Data |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 봞꺹ﳖǛ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 傜꾐ﳖǛ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 侗꾯ﳖǛ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 掸꿂ﳖǛ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 꿋ﳖǛ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 佌꿎ﳖǛ | RegNtPreCreateKey |
Show More
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\cmd.exe | 혺꿶ﳖǛ | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| User Data Access |
|
| Syscall Use |
Show More
161 additional items are not displayed above. |
| Anti Debug |
|
| Keyboard Access |
|
| Process Shell Execute |
|
| Process Manipulation Evasion |
|
| Network Wininet |
|
| Network Winhttp |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
(NULL) C:\Users\Ljaunynt\AppData\Local\Temp\RarSFX0\Soft.exe
|
(NULL) C:\Users\Ljaunynt\AppData\Local\Temp\RarSFX0\MAS_AIO.cmd
|
C:\WINDOWS\System32\sc.exe sc query Null
|
C:\WINDOWS\System32\find.exe find /i "RUNNING"
|
WriteConsole: STATE
|
Show More
WriteConsole:
|
C:\WINDOWS\System32\findstr.exe findstr /v "$" "MAS_AIO.cmd"
|
C:\WINDOWS\System32\reg.exe reg query "HKCU\Console" /v ForceV2
|
C:\WINDOWS\System32\find.exe find /i "0x0"
|
C:\WINDOWS\System32\cmd.exe C:\WINDOWS\System32\cmd.exe /S /D /c" echo "AMD64 " "
|
C:\WINDOWS\System32\find.exe find /i "ARM64"
|
C:\WINDOWS\system32\cmd.exe C:\WINDOWS\system32\cmd.exe /S /D /c" echo prompt $E "
|
C:\WINDOWS\system32\cmd.exe cmd
|
C:\WINDOWS\System32\cmd.exe C:\WINDOWS\System32\cmd.exe /S /D /c" echo "C:\Users\Ljaunynt\appdata\local\temp\rarsfx0\MAS_AIO.cmd" "
|
C:\WINDOWS\System32\find.exe find /i "C:\Users\Ljaunynt\AppData\Local\Temp"
|
WriteConsole:
|
WriteConsole: 1b5b34313b39376d3d3d3d3d20455252
|
WriteConsole: The script was l
|
WriteConsole: You are most lik
|
WriteConsole: Extract the arch
|