Summary | ZeroBOX

4b98d2919533ab614a7571aa0ef7c80fc177218bb778524fde3bf6f72b0d7b08.js

Browser Login Data Stealer Generic Malware Malicious Library Downloader UPX Malicious Packer PE File OS Processor Check JPEG Format PE32
Category Machine Started Completed
FILE s1_win7_x6401 July 10, 2024, 10:40 p.m. July 10, 2024, 10:42 p.m.
Size 840.7KB
Type ASCII text, with very long lines, with no line terminators
MD5 ad27be427dd7f922143e57fd1fa64f98
SHA256 4b98d2919533ab614a7571aa0ef7c80fc177218bb778524fde3bf6f72b0d7b08
CRC32 A87FA5E2
ssdeep 12288:ifY8It0lbvO1PJ9XyuRrvafaI8ieJaU4I79VXHv0aIn83IHiz0:iubAaIoUCI
Yara None matched

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
185.157.162.75 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2652
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73662000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2844
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73662000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2976
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72dd2000
process_handle: 0xffffffff
1 0 0
description windowsjx.exe tried to sleep 349 seconds, actually delayed analysis time by 349 seconds
file C:\Users\test22\AppData\Local\Temp\invoice_a_202.exe
file C:\Users\test22\AppData\Roaming\bQiNiwTuYc.js
file C:\Users\test22\AppData\Local\Temp\install.vbs
cmdline "C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Remcos\windowsjx.exe"
file C:\Users\test22\AppData\Local\Temp\invoice_a_202.exe
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\install.vbs
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\install.vbs
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: /c "C:\ProgramData\Remcos\windowsjx.exe"
filepath: cmd
1 1 0
host 185.157.162.75
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\microsoftjx reg_value "C:\ProgramData\Remcos\windowsjx.exe"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\microsoftjx reg_value "C:\ProgramData\Remcos\windowsjx.exe"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\microsoftjx reg_value "C:\ProgramData\Remcos\windowsjx.exe"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\microsoftjx reg_value "C:\ProgramData\Remcos\windowsjx.exe"
file C:\Users\test22\AppData\Local\Temp\invoice_a_202.exe
file C:\Users\test22\AppData\Local\Temp\install.vbs
Time & API Arguments Status Return Repeated

SetWindowsHookExA

thread_identifier: 0
callback_function: 0x00408d39
hook_identifier: 13 (WH_KEYBOARD_LL)
module_address: 0x00400000
1 721307 0
parent_process wscript.exe martian_process "C:\Windows\System32\wscript.exe" //B "C:\Users\test22\AppData\Roaming\bQiNiwTuYc.js"
parent_process wscript.exe martian_process "C:\Users\test22\AppData\Local\Temp\invoice_a_202.exe"
parent_process wscript.exe martian_process C:\Users\test22\AppData\Local\Temp\invoice_a_202.exe
parent_process wscript.exe martian_process wscript //B "C:\Users\test22\AppData\Roaming\bQiNiwTuYc.js"
parent_process wscript.exe martian_process cmd /c "C:\ProgramData\Remcos\windowsjx.exe"
parent_process wscript.exe martian_process "C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Remcos\windowsjx.exe"
file C:\Users\test22\AppData\Local\Temp\invoice_a_202.exe
Lionic Trojan.Script.Generic.4!c
McAfee JS/Vjw0rm.b
ALYac Trojan.Script.GenericKDZ.13960
VIPRE Trojan.Script.GenericKDZ.13960
Sangfor Malware.Generic-JS.Save.c2e12912
Arcabit Trojan.Script.Generic.D3688
Cyren JS/Agent.BII.gen!Eldorado
Symantec ISB.Dropper!gen1
ESET-NOD32 JS/TrojanDropper.Agent.NSL
Avast JS:Cryxos-M [Trj]
Cynet Malicious (score: 99)
BitDefender Trojan.Script.GenericKDZ.13960
NANO-Antivirus Trojan.Script.Dropper.foxxbq
MicroWorld-eScan Trojan.Script.GenericKDZ.13960
Rising Dropper.Agent/JS!8.126A2 (TOPIS:E0:A4NeuhdiXIR)
Emsisoft Trojan.Script.GenericKDZ.13960 (B)
F-Secure Malware.JS/Malscript.G34
DrWeb Trojan.Siggen18.29718
McAfee-GW-Edition JS/Vjw0rm.b
FireEye Trojan.Script.GenericKDZ.13960
Ikarus Trojan.Script
Avira JS/Malscript.G34
Microsoft Trojan:Win32/Leonem
GData Trojan.Script.GenericKDZ.13960
Google Detected
VBA32 suspected of JS.Crypted.Heur
Tencent Js.Virus.Malscript.Kqil
MAX malware (ai score=84)
AVG JS:Cryxos-M [Trj]
dead_host 185.157.162.75:62186
file C:\Users\test22\AppData\Local\Temp\invoice_a_202.exe
file C:\Windows\SysWOW64\wscript.exe
file C:\Windows\System32\cmd.exe