Technical Information
- <SYSTEM32>\tasks\nafifas
- %WINDIR%\microsoft.net\framework\v4.0.30319\csc.exe
- %APPDATA%\sgmonrs\sgmonrs.exe
- %ALLUSERSPROFILE%\remcos\logs.dat
- 'cl####.kozow.com':2404
- 'ge###ugin.net':80
- http://ge###ugin.net/json.gp
- 'cl####.kozow.com':2404
- DNS ASK cl####.kozow.com
- DNS ASK ge###ugin.net
- '%APPDATA%\sgmonrs\sgmonrs.exe'
- '%APPDATA%\sgmonrs\sgmonrs.exe' ' (with hidden window)
- '%WINDIR%\microsoft.net\framework\v4.0.30319\csc.exe'
- '%WINDIR%\syswow64\cmd.exe' /c mkdir "%APPDATA%\sgmonrs"
- '%WINDIR%\syswow64\cmd.exe' /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'%APPDATA%\sgmonrs\sgmonrs.exe'" /f
- '%WINDIR%\syswow64\cmd.exe' /c copy "<Full path to file>" "%APPDATA%\sgmonrs\sgmonrs.exe"
- '%WINDIR%\syswow64\schtasks.exe' /create /sc minute /mo 1 /tn "Nafifas" /tr "'%APPDATA%\sgmonrs\sgmonrs.exe'" /f
- '<SYSTEM32>\taskeng.exe' {7CD5431E-B8DE-46AC-BA4C-4A7E964C45E1} S-1-5-21-1238866942-1249195528-555854008-1000:pyvkffysneo\user:Interactive:[1]
- '%WINDIR%\syswow64\cmd.exe' /c copy "%APPDATA%\sgmonrs\sgmonrs.exe" "%APPDATA%\sgmonrs\sgmonrs.exe"