IP Address: 223.99.22.37Previously Malicious
Browse or download a weekly review of our cyber threat intelligence data and gain more insight to help protect your network
IP Address:
223.99.22.37
Previously Malicious
This IP address attempted an attack on a machine protected by Guardicore Centra
Role |
Attacker |
Services Targeted |
MSSQL |
Tags |
MSSQL Service Configuration Successful MSSQL Login DNS Query Persistency - Logon Download and Execute Access Suspicious Domain Service Start Post Reboot Rename IDS - Attempted User Privilege Gain Execute MsSql Shell Command Outgoing Connection Service Creation CMD File Operation By CMD |
Connect Back Servers |
ocsp2.globalsign.com mingtian2016.gnway.cc ocsp.globalsign.com map.baidu.com 113.240.239.69 x.huineng.co u.owwwa.com www.baidu.com a.owwwa.com ctldl.windowsupdate.com 2019.ip138.com x.owwwa.com owwwa.com |
IP Address |
223.99.22.37 |
|
Domain |
- |
|
ISP |
China Mobile Shandong |
|
Country |
China |
|
WHOIS |
Created Date |
- |
Updated Date |
- |
|
Organization |
- |
First seen in Guardicore Centra |
2019-04-05 |
Last seen in Guardicore Centra |
2019-04-05 |
What is Guardicore CentraGuardicore Centra is a data center and cloud security solution that protects the organization's core assets, using flexible, quickly deployed and easy to understand micro-segmentation controls. Centra generates in-context security incidents, with details on attacker tools and techniques, that help IR teams prioritize incident investigation and reduce dwell time. Learn More
A user logged in using MSSQL with the following credentials: user / ******* - Authentication policy: White List |
Successful MSSQL Login |
A user logged in using MSSQL with the following credentials: user / ******* - Authentication policy: Previously Approved User 3 times |
Successful MSSQL Login |
IDS detected Attempted User Privilege Gain : xp_enumerrorlogs access |
IDS - Attempted User Privilege Gain |
IDS detected Attempted User Privilege Gain : xp_reg* - registry access |
IDS - Attempted User Privilege Gain |
MSSQL executed 78 shell commands |
Execute MsSql Shell Command |
The file C:\taskmgzr.exe was downloaded and executed 2 times |
Download and Execute |
The file C:\ProgramData\taskmgzr.exe was downloaded and executed 2 times |
Download and Execute |
Process c:\windows\system32\wscript.exe attempted to access suspicious domains: mingtian2016.gnway.cc |
Access Suspicious Domain DNS Query |
IDS detected Attempted User Privilege Gain : xp_cmdshell - program execution |
IDS - Attempted User Privilege Gain |
IDS detected Attempted User Privilege Gain : SQL sp_configure - configuration change |
IDS - Attempted User Privilege Gain |
Process c:\windows\system32\cscript.exe attempted to access suspicious domains: mingtian2016.gnway.cc |
Access Suspicious Domain DNS Query |
Process c:\windows\system32\cscript.exe attempted to access suspicious domains: mingtian2016.gnway.cc |
Access Suspicious Domain DNS Query |
The file C:\ProgramData\sqlagentsom.exe was downloaded and executed 3 times |
Download and Execute |
c:\users\admini~1\appdata\local\temp\sqlagentsa.exe installed a Persistency - Logon backdoor by modifying Windows Registry |
Persistency - Logon |
Process c:\users\admini~1\appdata\local\temp\sqlagentsa.exe attempted to access suspicious domains: 113.240.239.69, a.owwwa.com, mingtian2016.gnway.cc, owwwa.com and u.owwwa.com |
Access Suspicious Domain Outgoing Connection DNS Query |
Process c:\users\admini~1\appdata\local\temp\sqlagentsa.exe generated outgoing network traffic to: 113.240.239.69:8046 |
Outgoing Connection |
Process c:\users\admini~1\appdata\local\temp\sqlagentsa.exe attempted to access domains: 2019.ip138.com, ctldl.windowsupdate.com, map.baidu.com, ocsp.globalsign.com, ocsp2.globalsign.com and www.baidu.com |
DNS Query |
The file C:\Program Files (x86)\Microsoft SQL Server\SQLIOSIMSA.exe was downloaded and executed 3 times |
Download and Execute |
The file C:\Program Files (x86)\Microsoft SQL Server\sqlbrowsers.exe was downloaded and executed 2 times |
Download and Execute |
c:\windows\system32\services.exe installed and started c:\program as a service named Microsoft SQL service under service group None |
Service Start Service Creation |
c:\windows\system32\services.exe installed and started c:\program as a service named Microsoft SQL Server under service group None |
Service Start Service Creation |
c:\windows\syswow64\410500.bak was deleted by c:\users\admini~1\appdata\local\temp\sqlbrowsers.exe ( pending reboot ) |
Post Reboot Rename |
Process c:\program files (x86)\microsoft sql server\sqlbrowsers.exe attempted to access suspicious domains: x.owwwa.com |
Access Suspicious Domain Outgoing Connection DNS Query |
Process c:\program files (x86)\microsoft sql server\sqlbrowsers.exe generated outgoing network traffic to: 113.240.239.69:21131 |
Outgoing Connection |
Process c:\program files (x86)\microsoft sql server\sqliosimsa.exe attempted to access suspicious domains: x.owwwa.com |
Access Suspicious Domain Outgoing Connection DNS Query |
Process c:\program files (x86)\microsoft sql server\sqliosimsa.exe generated outgoing network traffic to: 113.240.239.69:22279 |
Outgoing Connection |
The file C:\Program Files (x86)\SQLIOSIMS\SQLIOSIMS.exe was downloaded and executed |
Download and Execute |
c:\windows\system32\services.exe installed and started c:\program as a service named SQLAGENT MSSQL SQLIOSIMS under service group None |
Service Start Service Creation |
Process c:\program files (x86)\sqliosims\sqliosims.exe attempted to access suspicious domains: x.owwwa.com |
Access Suspicious Domain Outgoing Connection DNS Query |
Process c:\program files (x86)\sqliosims\sqliosims.exe generated outgoing network traffic to: 113.240.239.69:2228 |
Outgoing Connection |
Process c:\users\admini~1\appdata\local\temp\sqlagentc.exe attempted to access suspicious domains: x.huineng.co |
Access Suspicious Domain DNS Query |
Connection was closed due to timeout |
|
C:\Windows\Help\csrss.exe |
SHA256: 979e8800d489518978e1eae9d045efb97f286a5ca2f0f6d50c73bb6366a2e048 |
11264 bytes |
C:\ProgramData\sqlagentsom.exe |
SHA256: 0fce4d7f80add5dc7db4d58189904d624d879c82af527dc088232ab746d4d66e |
355840 bytes |
C:\Program Files (x86)\Microsoft SQL Server\SQLIOSIMSA.exe |
SHA256: 768a5f33a9e16e58585d6084666db6bd51b8c1fe296fa60efb0bac187e8cace0 |
48627712 bytes |
C:\Program Files (x86)\Microsoft SQL Server\sqlbrowsers.exe |
SHA256: 5ef919820fc19f0b8fa454bed37cc23f7b6b854758e5f6768aab3a933c9f2822 |
58978304 bytes |
C:\Program Files (x86)\SQLIOSIMS\SQLIOSIMS.exe |
SHA256: 20d4b243f07a35b01a682ae7546ab4f6dc257cfd2ddc0106b68d9c59f104db14 |
71360512 bytes |
C:\ProgramData\sqlagentsom.exe |
SHA256: 3e2b97f48f22125f1ef062a41fe7fcad8ec710a8130b19f0a634b6d6698fc1e6 |
355840 bytes |
C:\Program Files (x86)\Microsoft SQL Server\sqlbrowsers.exe |
SHA256: e83895c1b0c61cfb104e4ef0e01cd4cb832a16ef89b4bf660f06dc7e0f64fb18 |
58978304 bytes |
C:\Program Files (x86)\Microsoft SQL Server\SQLIOSIMSA.exe |
SHA256: c71bcf13e084ec213448db0b54372e553e252b44285b2360d5f7b9dae231abd2 |
48627712 bytes |
C:\Program Files (x86)\SQLIOSIMS\SQLIOSIMS.exe |
SHA256: 8a2cfa9e752bd971be7fc54e3f891cc00d8f17cd732fcdc5c51f7c5f60ad5305 |
71360512 bytes |
IP Address: 223.99.22.37Previously Malicious