Summary | ZeroBOX

Server.txt

PowerShell MZ ScreenShot AntiVM AntiDebug
Category Machine Started Completed
FILE s1_win7_x6401 Sept. 3, 2021, 8:49 a.m. Sept. 3, 2021, 8:58 a.m.
Size 117.2KB
Type ASCII text, with very long lines, with CRLF line terminators
MD5 94399d073244c168d813a46c1751b396
SHA256 30b4cfb6c0c1633fa3702b12a16bacdaff7a20e1667922e65f22843af46aeb88
CRC32 1F1B11E4
ssdeep 1536:LKywW7bhKpDpfOCXh9jSuzkXuxPdJ8hRNuNrKvLu2K94Drh:oY
Yara
  • PowerShell_Script_MZ_Zero - PowerShell Script MZ [Zero]

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch
20.150.137.35 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72a62000
process_handle: 0xffffffff
1 0 0
Symantec ML.Attribute.HighConfidence
Microsoft Trojan:Script/Wacatac.B!ml
description Take ScreenShot rule ScreenShot
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
host 20.150.137.35