Summary | ZeroBOX

NOV_INQUIRY.js

ActiveXObject
Category Machine Started Completed
FILE s1_win7_x6402 Nov. 16, 2023, 6:54 p.m. Nov. 16, 2023, 6:56 p.m.
Size 3.1KB
Type Little-endian UTF-16 Unicode text, with CRLF line terminators
MD5 b22055de1a1ea49c1b4f7d64ff315471
SHA256 6343522bdc6d71634d7fc6d0f6ac0f6b0bc1edd36060abd4fd9e700387a50601
CRC32 A131AFBF
ssdeep 24:QKV/xnPpzfYZljxkLHDG6WLXVvM7sGG0+4whz8GyME8xL9GXBsbn6V6FE0xUtnXc:JV/pipkLHSl4j+cGOaU4E7e3LVAHE
Yara
  • Javascript_ActiveXObject - Use ActiveXObject JavaScript

IP Address Status Action
104.21.6.247 Active Moloch
121.254.136.9 Active Moloch
164.124.101.2 Active Moloch
172.67.34.170 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49161 -> 172.67.34.170:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.102:49163 -> 104.21.6.247:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
UDP 192.168.56.102:62846 -> 164.124.101.2:53 2034938 ET POLICY Observed DNS Query to Pastebin-style Service (wtools .io) Potential Corporate Privacy Violation

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.102:49161
172.67.34.170:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com c7:af:cc:81:4d:27:d1:4c:7c:f4:bf:5d:55:9d:80:50:3b:6f:6c:cd
TLSv1
192.168.56.102:49163
104.21.6.247:443
C=US, O=Let's Encrypt, CN=E1 CN=wtools.io 3a:58:36:cd:4b:ef:eb:18:c3:bf:78:bd:93:e9:a1:d0:70:e3:b8:13

Time & API Arguments Status Return Repeated

__exception__

stacktrace:
CtfImeIsIME+0x36fd DllUnregisterServer-0xf9d9 msctf+0x2d08c @ 0x75d2d08c
TF_GetGlobalCompartment+0x3dfd CtfImeIsIME-0x344 msctf+0x2964b @ 0x75d2964b
TF_GetInputScope+0xf65 CtfImeDestroyThreadMgr-0x25ae msctf+0x14d6b @ 0x75d14d6b
TF_GetInputScope+0x3176 CtfImeDestroyThreadMgr-0x39d msctf+0x16f7c @ 0x75d16f7c
CtfImeDestroyInputContext+0x280 TF_CanUninitialize-0x1c msctf+0x1e825 @ 0x75d1e825
TF_GetInputScope+0x21fc CtfImeDestroyThreadMgr-0x1317 msctf+0x16002 @ 0x75d16002
TF_GetInputScope+0x21e2 CtfImeDestroyThreadMgr-0x1331 msctf+0x15fe8 @ 0x75d15fe8
TF_GetInputScope+0xbdd CtfImeDestroyThreadMgr-0x2936 msctf+0x149e3 @ 0x75d149e3
TF_GetInputScope+0x1c1a CtfImeDestroyThreadMgr-0x18f9 msctf+0x15a20 @ 0x75d15a20
RtlIsCurrentThreadAttachExempt+0x5f TpCheckTerminateWorker-0x37 ntdll+0x39a91 @ 0x774a9a91
LdrShutdownProcess+0x97 RtlDetectHeapLeaks-0x1bb ntdll+0x58f10 @ 0x774c8f10
RtlExitUserProcess+0x74 LdrShutdownProcess-0x1d ntdll+0x58e5c @ 0x774c8e5c
ExitProcess+0x15 TerminateThread-0xa kernel32+0x17a25 @ 0x74e87a25
wscript+0x2fbd @ 0x8a2fbd
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x74e833ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x774a9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x774a9ea5

exception.instruction_r: ff 51 0c 8b 45 fc 89 be 8c 04 00 00 3b c7 74 25
exception.symbol: TF_GetCompatibleKeyboardLayout+0x5885 TF_IsCtfmonRunning-0xfd3 msctf+0x43ef4
exception.instruction: call dword ptr [ecx + 0xc]
exception.module: MSCTF.dll
exception.exception_code: 0xc0000005
exception.offset: 278260
exception.address: 0x75d43ef4
registers.esp: 2489272
registers.edi: 0
registers.eax: 32384512
registers.ebp: 2489300
registers.edx: 1
registers.ebx: 0
registers.esi: 5576128
registers.ecx: 1939420884
1 0 0
request GET http://apps.identrust.com/roots/dstrootcax3.p7c
request GET https://pastebin.com/raw/NVAgzFRR
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 3024
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73933000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 15
family: 0
111 0
Time & API Arguments Status Return Repeated

WSASend

buffer: okeUæÛ™„ðd¿w„@ü‹¼î´ÑëÃID.Ïè>Zñ/5 ÀÀÀ À 28*ÿ pastebin.com  
socket: 600
0 0

WSASend

buffer: FBAºö>ûV£JÂL+‚Ý:'$¿( º:ãa tùp<rúUTЙæ0°†¤>fIJÀ֗z³M²Eeٚ‰QØ0‘Ãá»Ü—CÈ3†Va\kפ5Ã&ÊD‘4·Í"ó¡«qbµV ŒÅ ½
socket: 600
0 0

WSASend

buffer: ÐÜa Õ)0ƒXþ³`¤”¬Ld‚ŒíâÊ~dZ’P7¢gZu´0Ó©$7ý‚&HÞhQG(¹Wð5‚›Ð\ ¨Ï}„Z‘¨Ú¿-Œˆ¾Õ<G¿ÐX:²-S ô7 nEÛF†’'ŽžsËþ6¸15²ì$5šïRÞÖÇâµÏÃ;ÐQÿJ©wØIÐÏæ•6TñþBà÷­f\ŠxØê[3ôØ…†P´Z&B¯ôPÉ1Ú¹hA+˜@áæÜñYiÍéAS&lד êC
socket: 600
0 0

WSASend

buffer: lheUæ܈íèæW‰ò¢õPxç‘ Ì;A?ÃoÖ¸{ /5 ÀÀÀ À 28'ÿ wtools.io  
socket: 1100
0 0

WSASend

buffer: À“SpKRBAåõºŠT| Q?Ò ‰*¼tYËyƒ,›(ï.z‚2d úò—€MðV™ô %㘚 ïVØS‘š¯Nœ›ë¯UJ0» †žéìe¦B£ØåYvk»FfK7G$…:RK³™™=ädΠt%YÿIƒ™O Ó¶
socket: 1100
0 0

WSASend

buffer: GET /roots/dstrootcax3.p7c HTTP/1.1 Connection: Keep-Alive Accept: */* User-Agent: Microsoft-CryptoAPI/6.1 Host: apps.identrust.com
socket: 1160
0 0
Time & API Arguments Status Return Repeated

WSASend

buffer: okeUæÛ™„ðd¿w„@ü‹¼î´ÑëÃID.Ïè>Zñ/5 ÀÀÀ À 28*ÿ pastebin.com  
socket: 600
0 0

WSASend

buffer: FBAºö>ûV£JÂL+‚Ý:'$¿( º:ãa tùp<rúUTЙæ0°†¤>fIJÀ֗z³M²Eeٚ‰QØ0‘Ãá»Ü—CÈ3†Va\kפ5Ã&ÊD‘4·Í"ó¡«qbµV ŒÅ ½
socket: 600
0 0

WSASend

buffer: ÐÜa Õ)0ƒXþ³`¤”¬Ld‚ŒíâÊ~dZ’P7¢gZu´0Ó©$7ý‚&HÞhQG(¹Wð5‚›Ð\ ¨Ï}„Z‘¨Ú¿-Œˆ¾Õ<G¿ÐX:²-S ô7 nEÛF†’'ŽžsËþ6¸15²ì$5šïRÞÖÇâµÏÃ;ÐQÿJ©wØIÐÏæ•6TñþBà÷­f\ŠxØê[3ôØ…†P´Z&B¯ôPÉ1Ú¹hA+˜@áæÜñYiÍéAS&lד êC
socket: 600
0 0

WSASend

buffer: lheUæ܈íèæW‰ò¢õPxç‘ Ì;A?ÃoÖ¸{ /5 ÀÀÀ À 28'ÿ wtools.io  
socket: 1100
0 0

WSASend

buffer: À“SpKRBAåõºŠT| Q?Ò ‰*¼tYËyƒ,›(ï.z‚2d úò—€MðV™ô %㘚 ïVØS‘š¯Nœ›ë¯UJ0» †žéìe¦B£ØåYvk»FfK7G$…:RK³™™=ädΠt%YÿIƒ™O Ó¶
socket: 1100
0 0

WSASend

buffer: GET /roots/dstrootcax3.p7c HTTP/1.1 Connection: Keep-Alive Accept: */* User-Agent: Microsoft-CryptoAPI/6.1 Host: apps.identrust.com
socket: 1160
0 0