Summary | ZeroBOX

IEbrowserUpdates.vbs

Category Machine Started Completed
FILE s1_win7_x6403_us Jan. 23, 2024, 2:10 p.m. Jan. 23, 2024, 2:19 p.m.
Size 191.7KB
Type Little-endian UTF-16 Unicode text, with very long lines, with CRLF, CR line terminators
MD5 b188e3740962ca8e83f9a86ab3889c9f
SHA256 27a9c5e4f0f75d076d0aa37abf3b7b3f900c72146bd5977ae88cddb016ce531c
CRC32 740E59CE
ssdeep 3072:mlnpUPLnys2O17SpmzxvemRQrtN81QgvmIIb6t:mlnpUPLnys2OspmzxvYi
Yara None matched

Name Response Post-Analysis Lookup
paste.ee 104.21.84.67
IP Address Status Action
104.21.84.67 Active Moloch
164.124.101.2 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49162 -> 104.21.84.67:443 2034978 ET POLICY Pastebin-style Service (paste .ee) in TLS SNI Potential Corporate Privacy Violation
TCP 192.168.56.103:49162 -> 104.21.84.67:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49162 -> 104.21.84.67:443 2034978 ET POLICY Pastebin-style Service (paste .ee) in TLS SNI Potential Corporate Privacy Violation

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49162
104.21.84.67:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 CN=paste.ee c2:b4:ac:5e:d6:d0:79:48:bd:61:49:ff:7a:f4:5f:ee:d4:45:1b:74

request GET http://paste.ee/d/ywRmc
request GET https://paste.ee/d/ywRmc
Skyhigh BehavesLike.VBS.Dropper.nv
Symantec ISB.Downloader!gen40
Kaspersky HEUR:Trojan.VBS.SAgent.gen
Time & API Arguments Status Return Repeated

WSASend

buffer: GET /d/ywRmc HTTP/1.1 Connection: Keep-Alive Accept: */* User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) Host: paste.ee
socket: 540
0 0

WSASend

buffer: kge¯J#ÀÔj§ãx^@`§ÿP ñ5Â’º‹Ï‹u¶Í/5 ÀÀÀ À 28&ÿ paste.ee  
socket: 540
0 0

WSASend

buffer: à¾X(zBAüHnÀs“ëõAUuӈ8/lÊ%ߔüÒé:Ÿ_(“ÂQ·«¯zmè«zC˜O#ý§ßÛ!å,KBŸ:–0¼OÀóD_©“B†Ôz÷]–’;å„aën÷Ÿ^•c$ƒYnìbó®*ó­ÆDËâëÌj
socket: 540
0 0

WSASend

buffer: ° ²]l3Óñìñpb°Õx²¶<óÁ^Ëx¬(‚µ¡èx€ÉÏyÇNÑ»MQý-ýí_¼«ÉgÈ ¤Ý՝W³X…ìFô›úXâg¾{‚%û–ÞZÊ£æ.;ôƒ”eê÷쨎'_j.yÓ%ÆÕ`ßl8ƒµ °D jiӟ÷{¶ÕáV¸1èm÷>¤Üt¶;Ÿ äÑü™›YWÅôgZ@àÈd˓Hε¡ÜJ¹!z
socket: 540
0 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F81F111D0E5AB58D396F7BF525577FD30FDC95AA\Blob
Time & API Arguments Status Return Repeated

WSASend

buffer: GET /d/ywRmc HTTP/1.1 Connection: Keep-Alive Accept: */* User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) Host: paste.ee
socket: 540
0 0

WSASend

buffer: kge¯J#ÀÔj§ãx^@`§ÿP ñ5Â’º‹Ï‹u¶Í/5 ÀÀÀ À 28&ÿ paste.ee  
socket: 540
0 0

WSASend

buffer: à¾X(zBAüHnÀs“ëõAUuӈ8/lÊ%ߔüÒé:Ÿ_(“ÂQ·«¯zmè«zC˜O#ý§ßÛ!å,KBŸ:–0¼OÀóD_©“B†Ôz÷]–’;å„aën÷Ÿ^•c$ƒYnìbó®*ó­ÆDËâëÌj
socket: 540
0 0

WSASend

buffer: ° ²]l3Óñìñpb°Õx²¶<óÁ^Ëx¬(‚µ¡èx€ÉÏyÇNÑ»MQý-ýí_¼«ÉgÈ ¤Ý՝W³X…ìFô›úXâg¾{‚%û–ÞZÊ£æ.;ôƒ”eê÷쨎'_j.yÓ%ÆÕ`ßl8ƒµ °D jiӟ÷{¶ÕáV¸1èm÷>¤Üt¶;Ÿ äÑü™›YWÅôgZ@àÈd˓Hε¡ÜJ¹!z
socket: 540
0 0