Summary | ZeroBOX

C713.wsf

Category Machine Started Completed
FILE s1_win7_x6402 May 3, 2023, 9:50 a.m. May 3, 2023, 9:52 a.m.
Size 42.9KB
Type UTF-8 Unicode text, with very long lines, with CRLF, LF line terminators
MD5 ad4bcd97e9014f9f76b05d5db8b1e273
SHA256 2cfffc7aff2656ddac2d73b855a70757e5370bf1af8f1ba1355daa23fdfef351
CRC32 2901C417
ssdeep 768:FjAbTum3DfTvVmnw5WyDCblhkehECwcbTum3DDe2xJ1ll:Fjkl3DbvwnPlDhvLl3Dzr
Yara None matched

IP Address Status Action
103.41.206.174 Active Moloch
108.167.180.121 Active Moloch
162.241.194.193 Active Moloch
164.124.101.2 Active Moloch
192.185.79.168 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49167 -> 162.241.194.193:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49161 -> 192.185.79.168:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49163 -> 192.185.79.168:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49166 -> 162.241.194.193:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.185.79.168:443 -> 192.168.56.102:49164 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.102:49174 -> 103.41.206.174:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 162.241.194.193:443 -> 192.168.56.102:49168 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.102:49170 -> 108.167.180.121:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49171 -> 108.167.180.121:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 108.167.180.121:443 -> 192.168.56.102:49172 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49174
103.41.206.174:443
C=US, ST=TX, L=Houston, O=cPanel, Inc., CN=cPanel, Inc. Certification Authority CN=tridayaonline.com b7:26:61:c5:52:d4:bf:e1:e9:77:dc:f7:0c:c3:39:b2:43:3b:06:21

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0
request GET https://tridayaonline.com/rf7H/1203
Time & API Arguments Status Return Repeated

InternetCrackUrlW

url: https://abragest.com/yKmmLBY/170
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /yKmmLBY/170
1 13369356 0

InternetCrackUrlW

url: https://puntoproduction.com/87bacDu/1704
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /87bacDu/1704
1 13369356 0

InternetCrackUrlW

url: https://demosites.live/zAjzkL/200
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /zAjzkL/200
1 13369356 0

InternetCrackUrlW

url: https://tridayaonline.com/rf7H/1203
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /rf7H/1203
1 13369356 0

InternetCrackUrlA

url: https://tridayaonline.com/rf7H/1203
flags: 0
1 1 0
Time & API Arguments Status Return Repeated

InternetCrackUrlW

url: https://abragest.com/yKmmLBY/170
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /yKmmLBY/170
1 13369356 0

send

buffer: !
socket: 852
sent: 1
1 1 0

send

buffer: okdQ¯ßÏkyÎFåˁo¡aµf&Ùbk£×ŽDë/5 ÀÀÀ À 28*ÿ abragest.com  
socket: 960
sent: 116
1 116 0

send

buffer: !
socket: 852
sent: 1
1 1 0

send

buffer: !
socket: 852
sent: 1
1 1 0

send

buffer: okdQ¯à˜DԆHQy >åÝ"Â$– ?ÿkÂ;—`dß/5 ÀÀÀ À 28*ÿ abragest.com  
socket: 960
sent: 116
1 116 0

send

buffer: !
socket: 852
sent: 1
1 1 0

send

buffer: !
socket: 852
sent: 1
1 1 0

send

buffer: 51dQ¯à³}ôu&¬uÿ-œ± ¢8y~ñÇ9û M]î  ÿ
socket: 960
sent: 58
1 58 0

send

buffer: !
socket: 852
sent: 1
1 1 0

send

buffer: !
socket: 852
sent: 1
1 1 0

InternetCrackUrlW

url: https://puntoproduction.com/87bacDu/1704
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /87bacDu/1704
1 13369356 0

send

buffer: !
socket: 852
sent: 1
1 1 0

send

buffer: vrdQ¯á̸ê¯ebZ^3%Á*Ó£Ù&y”ÇÅÄ1ÙP Ž²/5 ÀÀÀ À 281ÿpuntoproduction.com  
socket: 1076
sent: 123
1 123 0

send

buffer: !
socket: 852
sent: 1
1 1 0

send

buffer: !
socket: 852
sent: 1
1 1 0

send

buffer: vrdQ¯áakÛ;½*, Γ©ÔÑß:­›¬Ð4äßPù/5 ÀÀÀ À 281ÿpuntoproduction.com  
socket: 1076
sent: 123
1 123 0

send

buffer: !
socket: 852
sent: 1
1 1 0

send

buffer: !
socket: 852
sent: 1
1 1 0

send

buffer: 51dQ¯á}ðe¼FèÈÄфk Šu%ýÝAà2â¦»è³  ÿ
socket: 1080
sent: 58
1 58 0

send

buffer: !
socket: 852
sent: 1
1 1 0

send

buffer: !
socket: 852
sent: 1
1 1 0

InternetCrackUrlW

url: https://demosites.live/zAjzkL/200
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /zAjzkL/200
1 13369356 0

send

buffer: !
socket: 852
sent: 1
1 1 0

send

buffer: qmdQ¯âîÝLGô`ü§bGÑÛf|k(ëõg¦d½¡©//5 ÀÀÀ À 28,ÿdemosites.live  
socket: 1084
sent: 118
1 118 0

send

buffer: !
socket: 852
sent: 1
1 1 0

send

buffer: !
socket: 852
sent: 1
1 1 0

send

buffer: qmdQ¯ã¤!´­°^Çí(ä˜ «ºM6|vI³sç̱U/5 ÀÀÀ À 28,ÿdemosites.live  
socket: 1084
sent: 118
1 118 0

send

buffer: !
socket: 852
sent: 1
1 1 0

send

buffer: !
socket: 852
sent: 1
1 1 0

send

buffer: 51dQ¯ãõIÚ¢”âša¥$w“Rš–„´©š—ÈŠ®9;  ÿ
socket: 1088
sent: 58
1 58 0

send

buffer: !
socket: 852
sent: 1
1 1 0

send

buffer: !
socket: 852
sent: 1
1 1 0

InternetCrackUrlW

url: https://tridayaonline.com/rf7H/1203
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 12582912
http_method: GET
referer:
path: /rf7H/1203
1 13369356 0

send

buffer: !
socket: 852
sent: 1
1 1 0

send

buffer: tpdQ¯å,g¼”‡ÐÜýÆ?ç€ñ9.ӝ ‡6ã`gÉ%x/5 ÀÀÀ À 28/ÿtridayaonline.com  
socket: 1092
sent: 121
1 121 0

send

buffer: !
socket: 852
sent: 1
1 1 0

send

buffer: FBA¾QõƒçÉȧ xå Q֎ÏY|¯Rˆ(Vê-wÍ¢ÙWÀ7õŽAMӚ5$ìG^Ú¾éÇ[vɇ P0{¨'´zê䩕:õ~튚ÓD½:ȵu~{Ʋ–$ëÄÿÌwÞz^SU¤ 2ª
socket: 1092
sent: 134
1 134 0

send

buffer: !
socket: 852
sent: 1
1 1 0

send

buffer: `£¿~ KÔµ¯Ë86C+ûž+°×Ô*²n»Â%áŽë0K1š9»•ºeVUUüx÷µ­ØÚôÅ Kp †þÊÏAç;¦‘ ¬Ì¦é[—"½ŸãOâ9ûk ýBû K¶´¬9 ¤ý›”|†‚ ‘UB؟aV ì‰Ìܛ⌽ÖO+ …ºGcú'¤É¢ÖP~>¼{öM S¡âÓÉòÂMJUp{±üQßÂñì¢ ,+G«ÖUqߕâí)™ ( ­ ¨þ¤ÐF±DõȤ¸rÜ6>˜ô$IwQ²×"˜¸/éO÷QwBnêwe˜ýHÅMïý±Lò0@J?Ïþ©’Ÿˆ•EIÞÖ×£“2Ôçó¯y]ÅߜXlŒãÇ°`‘ƒ)²€ …)I„1†}jº -sùؐc©30¾úOóz4Öî5‘‹x‡m„_Úd¥ž_]iOçøFQ
socket: 1092
sent: 357
1 357 0

send

buffer: !
socket: 852
sent: 1
1 1 0

InternetCrackUrlA

url: https://tridayaonline.com/rf7H/1203
flags: 0
1 1 0
Time & API Arguments Status Return Repeated

IWbemServices_ExecMethod

inargs.CurrentDirectory: None
inargs.CommandLine: C:\\Windows\\SysWOW64\\rundll32.exe C:\ProgramData\az9rjoe8faNg.dat,Time
inargs.ProcessStartupInformation: None
outargs.ProcessId: 2380
outargs.ReturnValue: 0
flags: 0
method: Create
class: Win32_Process
1 0 0
count 13936 name heapspray process wscript.exe total_mb 163 length 12288 protection PAGE_READWRITE
count 13918 name heapspray process wscript.exe total_mb 489 length 36864 protection PAGE_READWRITE
count 1740 name heapspray process wscript.exe total_mb 101 length 61440 protection PAGE_READWRITE
count 3482 name heapspray process wscript.exe total_mb 136 length 40960 protection PAGE_READWRITE
count 13952 name heapspray process wscript.exe total_mb 54 length 4096 protection PAGE_READWRITE
count 10465 name heapspray process wscript.exe total_mb 81 length 8192 protection PAGE_READWRITE
count 1741 name heapspray process wscript.exe total_mb 88 length 53248 protection PAGE_READWRITE
count 1744 name heapspray process wscript.exe total_mb 54 length 32768 protection PAGE_READWRITE
count 3478 name heapspray process wscript.exe total_mb 258 length 77824 protection PAGE_READWRITE
count 1739 name heapspray process wscript.exe total_mb 169 length 102400 protection PAGE_READWRITE
count 3484 name heapspray process wscript.exe total_mb 54 length 16384 protection PAGE_READWRITE
count 12181 name heapspray process wscript.exe total_mb 237 length 20480 protection PAGE_READWRITE
count 5222 name heapspray process wscript.exe total_mb 224 length 45056 protection PAGE_READWRITE
count 3484 name heapspray process wscript.exe total_mb 81 length 24576 protection PAGE_READWRITE
count 6965 name heapspray process wscript.exe total_mb 326 length 49152 protection PAGE_READWRITE