Summary | ZeroBOX

a.ps1

Generic Malware Antivirus
Category Machine Started Completed
FILE s1_win7_x6401 Nov. 27, 2023, 10:02 a.m. Nov. 27, 2023, 10:05 a.m.
Size 866.9KB
Type ASCII text, with very long lines
MD5 d80666f445b6a86fbf383d69186a2cae
SHA256 7b2e44096266be141c35920e36856c850f5cf67d5b23b8b85c19c175f3fc002e
CRC32 8494200E
ssdeep 24576:C4PgiaAy6W6ke52KvgA+8Ne5n+Myt/Ca65gulF/yc/F1YQKB2xca+4kndVHg23c6:C4HXke5TgYt/Caqgult/TYQTSa240fwG
Yara
  • Antivirus - Contains references to security software

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
117.18.232.200 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x05f610a8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x05f610a8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x05f610a8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x05f610a8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x05f610a8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2540
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0265b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2540
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x026af000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2540
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02639000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2540
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x060e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\a.ps1
host 117.18.232.200
ESET-NOD32 Win32/Rozena.ACE
Kaspersky UDS:DangerousObject.Multi.Generic
Ikarus Trojan.PowerShell.Crypt
Kingsoft Win32.Trojan.Cometer.gen
Microsoft Trojan:Win32/ScarletFlash.A
ZoneAlarm HEUR:Trojan.Win32.Cometer.gen
GData Script.Trojan.Agent.202Q8Y
Google Detected
AhnLab-V3 Trojan/PowerShell.CobaltStrike.S1463
Tencent Win32.Trojan.Cometer.Ytjl