Summary | ZeroBOX

kz.js

Browser Login Data Stealer Generic Malware Malicious Library Downloader UPX Malicious Packer PE File OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6403_us Aug. 7, 2024, 1:21 p.m. Aug. 7, 2024, 1:24 p.m.
Size 10.4MB
Type Little-endian UTF-16 Unicode text, with very long lines, with CRLF line terminators
MD5 e1e3b54f17e16c5e867a9e7ee6d196ba
SHA256 07b5901c21252b5d7ff5eabec26a715788954687f3f0895077b3380023599018
CRC32 DC1291B4
ssdeep 49152:Lp+LHU1WOPjbxAzaL/W3PkXI3TF+XW9q52CgY0csNx543Ze7Qlb7uxKiG3RPgZKW:y
Yara None matched

Name Response Post-Analysis Lookup
kizitodavina.duckdns.org 46.246.84.3
IP Address Status Action
164.124.101.2 Active Moloch
46.246.84.3 Active Moloch

domain kizitodavina.duckdns.org
description adobe.exe tried to sleep 350 seconds, actually delayed analysis time by 350 seconds
file C:\Users\test22\AppData\Local\Temp\BEl.exe
file C:\Users\test22\AppData\Local\Temp\BEl.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Rmc-EYFGG7 reg_value "C:\ProgramData\adobe\adobe.exe"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-EYFGG7 reg_value "C:\ProgramData\adobe\adobe.exe"
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Rmc-EYFGG7 reg_value "C:\ProgramData\adobe\adobe.exe"
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-EYFGG7 reg_value "C:\ProgramData\adobe\adobe.exe"
file C:\Users\test22\AppData\Local\Temp\BEl.exe
Time & API Arguments Status Return Repeated

SetWindowsHookExA

thread_identifier: 0
callback_function: 0x0040a2a4
hook_identifier: 13 (WH_KEYBOARD_LL)
module_address: 0x00400000
1 131541 0
parent_process wscript.exe martian_process "C:\Users\test22\AppData\Local\Temp\BEl.exe"
parent_process wscript.exe martian_process C:\Users\test22\AppData\Local\Temp\BEl.exe
dead_host 46.246.84.3:8645
file C:\Users\test22\AppData\Local\Temp\BEl.exe