codienviet.com(autoit bot)

codienviet.com
codienviet.com 74.50.13.8
irc.abjects.net 74.3.165.66
Download URLs
http://74.50.13.8/bot/data.php (codienviet.com)

Outgoing connection to remote server: codienviet.com TCP port 80
C&C Server: 74.3.165.66:6667
Server Password:
Username: XYZ-AEMPILWXUC
Nickname: XYZ-AEMPILWXUC
Channel: #xyz (Password: 3939)
Channeltopic: :_CHAR(0x02)__CHAR(0x03)_0,8|_CHAR(0x03)_7,8|_CHAR(0x03)_8,7|_CHAR(0x03)_4,7|_CHAR(0x03)_7,4|_CHAR(0x03)_5,4|_CHAR(0x03)_4,5|_CHAR(0x03)_1,5|_CHAR(0x03)_5,1| _CHAR(0x03)_9,1Welcome to mylove channel #XYZ…. enjoy and fun….. keep your smile…._CHAR(0x03)_5,1 |_CHAR(0x03)_1,5|_CHAR(0x03)_4,5|_CHAR(0x03)_5,4|_CHAR(0x03)_7,4|_CHAR(0x03)_4,7|_CHAR(0x03)_8,7|_CHAR(0x0F)_

Registry Changes by all processes
Create or Open
Changes HKEY_CURRENT_USERSoftwarePoliciesMicrosoftInternet ExplorerControl Panel “Homepage” = [REG_DWORD, value: 00000000]
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem “DisableTaskMgr” = [REG_DWORD, value: 00000000]
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem “DisableRegistryTools” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionpoliciessystem “DisableTaskMgr” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionpoliciessystem “DisableRegistryTools” = [REG_DWORD, value: 00000000]
HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerMain “Start Page” = http://autokiemthe.com
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun “Windows Updates” = C:WINDOWSsystem32svihost.exe
HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerMain “Start Page” = http://autogamepro.com
Reads HKEY_CURRENT_USERControl PanelMouse “SwapMouseButtons”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTFSystemShared “CUAS”
HKEY_CURRENT_USERKeyboard LayoutToggle “Language Hotkey”
HKEY_CURRENT_USERKeyboard LayoutToggle “Layout Hotkey”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCTF “EnableAnchorContext”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionIMM “Ime File”
HKEY_CURRENT_USERSoftwareMicrosoftCTF “Disable Thread Input Manager”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftRpcSecurityService “10”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlSecurityProviders “SecurityProviders”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsapsspc.dll “Name”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsapsspc.dll “Comment”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsapsspc.dll “Capabilities”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsapsspc.dll “RpcId”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsapsspc.dll “Version”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsapsspc.dll “Type”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsapsspc.dll “TokenSize”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachedigest.dll “Name”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachedigest.dll “Comment”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachedigest.dll “Capabilities”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachedigest.dll “RpcId”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachedigest.dll “Version”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachedigest.dll “Type”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachedigest.dll “TokenSize”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsnsspc.dll “Name”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsnsspc.dll “Comment”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsnsspc.dll “Capabilities”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsnsspc.dll “RpcId”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsnsspc.dll “Version”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsnsspc.dll “Type”
HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsaSspiCachemsnsspc.dll “TokenSize”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftRpcSecurityService “DefaultAuthLevel”
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun “dunghoitaisao”

File Changes by all processes
New Files C:WINDOWSsystem32svihost.exe
DeviceTcp
DeviceIp
DeviceIp
DeviceRasAcd
DeviceTcp6
C:WINDOWSsystem32check.txt
Opened Files c:svihost.exe
.PIPElsarpc
C:svihost.exe
c:autoexec.bat
.PIPEROUTER
.Ip
C:WINDOWSsystem32check.txt
Deleted Files
Chronological Order Open File: c:svihost.exe (OPEN_EXISTING)
Get File Attributes: C:WINDOWS Flags: (SECURITY_ANONYMOUS)
Open File: .PIPElsarpc (OPEN_EXISTING)
Open File: C:svihost.exe (OPEN_EXISTING)
Get File Attributes: C:WINDOWSsystem32update.exe Flags: (SECURITY_ANONYMOUS)
Find File: C:WINDOWSsystem32update.exe
Get File Attributes: c:svihost.exe Flags: (SECURITY_ANONYMOUS)
Get File Attributes: C:WINDOWSsystem32svihost.exe Flags: (SECURITY_ANONYMOUS)
Find File: c:svihost.exe
Find File: C:WINDOWSsystem32svihost.exe
Copy File: c:svihost.exe to C:WINDOWSsystem32svihost.exe
Get File Attributes: svihost.exe Flags: (SECURITY_ANONYMOUS)
Find File: svihost.exe
Set File Attributes: svihost.exe Flags: (FILE_ATTRIBUTE_ARCHIVE FILE_ATTRIBUTE_COMPRESSED FILE_ATTRIBUTE_HIDDEN FILE_ATTRIBUTE_SYSTEM FILE_ATTRIBUTE_COMPRESSED SECURITY_ANONYMOUS)
Get File Attributes: C:Documents and SettingsAdministratorCookies*.txt Flags: (SECURITY_ANONYMOUS)
Find File: C:Documents and SettingsAdministratorCookies*.txt
Get File Attributes: c:autoexec.bat Flags: (SECURITY_ANONYMOUS)
Open File: c:autoexec.bat (OPEN_EXISTING)
Find File: C:Dokumente und EinstellungenAll UsersAnwendungsdatenMicrosoftNetworkConnectionsPbk*.pbk
Find File: C:WINDOWSsystem32Ras*.pbk
Find File: C:Dokumente und EinstellungenAdministratorAnwendungsdatenMicrosoftNetworkConnectionsPbk*.pbk
Open File: .PIPEROUTER (OPEN_EXISTING)
Create/Open File: DeviceTcp (OPEN_ALWAYS)
Create/Open File: DeviceIp (OPEN_ALWAYS)
Create/Open File: DeviceIp (OPEN_ALWAYS)
Open File: .Ip (OPEN_EXISTING)
Create/Open File: DeviceRasAcd (OPEN_ALWAYS)
Create/Open File: DeviceTcp6 (OPEN_ALWAYS)
Create File: C:WINDOWSsystem32check.txt
Open File: C:WINDOWSsystem32check.txt (OPEN_EXISTING)
Get File Attributes: C:WINDOWSserver.txt Flags: (SECURITY_ANONYMOUS)
Find File: C:WINDOWSserver.txt
Get File Attributes: C:WINDOWSsystem32server.txt Flags: (SECURITY_ANONYMOUS)
Find File: C:WINDOWSsystem32server.txt

Categories: Uncategorized