Windows
Analysis Report
DOC117482996.js
Overview
General Information
Detection
Score: | 92 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
wscript.exe (PID: 7020 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\DOC11 7482996.js " MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C) cmd.exe (PID: 7112 cmdline:
C:\Windows \System32\ cmd.exe" / k copy "C: \Users\use r\Desktop\ DOC1174829 96.js" "C: \Users\use r\AppData\ Local\Temp \UHTGEZZ.b at" && "C: \Users\use r\AppData\ Local\Temp \UHTGEZZ.b at MD5: 4E2ACF4F8A396486AB4268C94A6A245F) conhost.exe (PID: 7116 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) findstr.exe (PID: 5788 cmdline:
findstr /V OJGKAOK " "C:\Users\ user\AppDa ta\Local\T emp\UHTGEZ Z.bat"" MD5: BCC8F29B929DABF5489C9BE6587FF66D) certutil.exe (PID: 6768 cmdline:
certutil - f -decodeh ex MAVOOTC RCOJOMG.d ll MD5: EB199893441CED4BBBCB547FE411CF2D) rundll32.exe (PID: 6748 cmdline:
rundll32 R COJOMG.dll ,h MD5: 73C519F050C20580F8A62C849D49215A)
- cleanup
{
"C2 url": "91.215.85.209/server.php"
}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security | ||
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security | ||
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security | ||
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security | ||
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security |
Data Obfuscation |
---|
Source: | Author: Joe Security: |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link |
Networking |
---|
Source: | URLs: |
Source: | Initial sample: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Static PE information: |
Source: | Key opened: |
Source: | Process created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Key value queried: |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Process created: |
Source: | Classification label: |
Source: | File read: | Jump to behavior |
Source: | Static file information: |
Data Obfuscation |
---|
Source: | Anti Malware Scan Interface: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Source: | Window found: |
Source: | Code function: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Queries volume information: |
Source: | Key value queried: |
Source: | Code function: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 121 Scripting | Path Interception | 11 Process Injection | 1 Rundll32 | OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | Exfiltration Over Other Network Medium | 1 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 11 Process Injection | LSASS Memory | 1 File and Directory Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 1 Application Layer Protocol | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 121 Scripting | Security Account Manager | 13 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 2 Obfuscated Files or Information | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
3% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
19% | Virustotal | Browse |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| low |
Joe Sandbox Version: | 38.0.0 Beryl |
Analysis ID: | 1272186 |
Start date and time: | 2023-07-13 07:57:56 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 8m 38s |
Hypervisor based Inspection enabled: | false |
Report type: | light |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Run name: | Without Instrumentation |
Number of analysed new started processes analysed: | 9 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample file name: | DOC117482996.js |
Detection: | MAL |
Classification: | mal92.troj.evad.winJS@10/4@0/0 |
EGA Information: |
|
HDC Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, W MIADAP.exe, conhost.exe - Excluded domains from analysis
(whitelisted): ctldl.windowsu pdate.com - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtOpenKeyEx calls foun d. - Report size getting too big, t
oo many NtProtectVirtualMemory calls found. - Report size getting too big, t
oo many NtQueryValueKey calls found.
Process: | C:\Windows\System32\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 1762499 |
Entropy (8bit): | 3.3606309435141175 |
Encrypted: | false |
SSDEEP: | 12288:d9cKrrX0UIbyMJRj4pft6g0tmjivaZAgoaT6QRxIa99ReymNmt50K/A/he3/pCYM:d9XX9UZ78P0Y50K/Tw |
MD5: | A6329B9910C25E35249C8126F877DC35 |
SHA1: | D236F436CF9FBB087146006E9AD6E2178C4498A0 |
SHA-256: | 3FF9123B260EA4324F9A09A049133BAF7D6F47B0D33A4E1D28A987371C4C8A8B |
SHA-512: | 2CEBAA9E7F0C3F0D1974FADF0547710C93BBE018A7FDE6F45369C9F87269F6046C8949DFC360EFD0FFA197FDCECBF373E80C3390BAC8A9B3B744416C5EF80F06 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\certutil.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 587499 |
Entropy (8bit): | 6.643491802328249 |
Encrypted: | false |
SSDEEP: | 6144:9nKczq9WO0eTyLm/kp6KzeAb1gyXj0ZrMUo7TKzy:9n+Fa85ajCrOPKO |
MD5: | 35CC317D77B602E13A4979406F829D24 |
SHA1: | 218CDA509DD5FB30FA5BD08F23CFBB2C851C0DA9 |
SHA-256: | 957EEA25423A4F43E85EA4FDC6695048DBAE579FDF277C530F98C199C71902B4 |
SHA-512: | B84A98CC8998AA8209C1B5D9756B0458EDA91DF91C70A884B7B06E3EDAA6451E21D5CFB38D03939AE60B6CE0B5AD7FA4B0D12D86C49F8D69721C9AC094439B01 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1765670 |
Entropy (8bit): | 3.3776219279560267 |
Encrypted: | false |
SSDEEP: | 12288:m9cKrrX0UIbyMJRj4pft6g0tmjivaZAgoaT6QRxIa99ReymNmt50K/A/he3/pCYY:m9XX9UZ78P0Y50K/T0 |
MD5: | 25C2826D695B5856D3FAEBAEC17FBB12 |
SHA1: | AEEEC46028687D1F2718DC2C679302424D9E558C |
SHA-256: | 6EF79B0D87DF8031ACAA5F7302001FCA22F908619F1C887CE70539050C3235CE |
SHA-512: | 9A63C5179DFB23A69769A3C221FDC1FCCF2F7671CD3C67A42CE4A2ADCC1D1238CF682F04CD4A1EB44F680A49236CF2C3EE134298E2A49A53D805E765ACC128D3 |
Malicious: | true |
Preview: |
Process: | C:\Windows\System32\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 3.3776219279560267 |
TrID: | |
File name: | DOC117482996.js |
File size: | 1'765'670 bytes |
MD5: | 25c2826d695b5856d3faebaec17fbb12 |
SHA1: | aeeec46028687d1f2718dc2c679302424d9e558c |
SHA256: | 6ef79b0d87df8031acaa5f7302001fca22f908619f1c887ce70539050c3235ce |
SHA512: | 9a63c5179dfb23a69769a3c221fdc1fccf2f7671cd3c67a42ce4a2adcc1d1238cf682f04cd4a1eb44f680a49236cf2c3ee134298e2a49a53d805e765acc128d3 |
SSDEEP: | 12288:m9cKrrX0UIbyMJRj4pft6g0tmjivaZAgoaT6QRxIa99ReymNmt50K/A/he3/pCYY:m9XX9UZ78P0Y50K/T0 |
TLSH: | 1C85CC0E55AC130EC7222AEE6B6D34D38374DB17B5F5C9D2899DBAA29C5DC368B31034 |
File Content Preview: | /* OJGKAOK..set OJGKAOKPPMSURA=e..set OJGKAOKKVKYJ=f..set OJGKAOKOVMSDGU=n..set OJGKAOKAGWIEVF=v..set OJGKAOKPNEMKCZ=x..set OJGKAOKJXHTS=g..set OJGKAOKXBSVW=c..set OJGKAOKOISVQE=r..set OJGKAOKAIMYH=k..set OJGKAOKYNRXWX=l..set OJGKAOKLIRHF=a..set OJGKAOKZM |
Icon Hash: | 68d69b8bb6aa9a86 |
Click to jump to process
Target ID: | 0 |
Start time: | 07:58:55 |
Start date: | 13/07/2023 |
Path: | C:\Windows\System32\wscript.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff61ac60000 |
File size: | 163'840 bytes |
MD5 hash: | 9A68ADD12EB50DDE7586782C3EB9FF9C |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 1 |
Start time: | 07:58:57 |
Start date: | 13/07/2023 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff627730000 |
File size: | 273'920 bytes |
MD5 hash: | 4E2ACF4F8A396486AB4268C94A6A245F |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 2 |
Start time: | 07:58:57 |
Start date: | 13/07/2023 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7fcd70000 |
File size: | 625'664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 3 |
Start time: | 07:58:58 |
Start date: | 13/07/2023 |
Path: | C:\Windows\System32\findstr.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7b47a0000 |
File size: | 34'304 bytes |
MD5 hash: | BCC8F29B929DABF5489C9BE6587FF66D |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Target ID: | 4 |
Start time: | 07:58:59 |
Start date: | 13/07/2023 |
Path: | C:\Windows\System32\certutil.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff791620000 |
File size: | 1'557'504 bytes |
MD5 hash: | EB199893441CED4BBBCB547FE411CF2D |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Target ID: | 5 |
Start time: | 07:59:00 |
Start date: | 13/07/2023 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7a0860000 |
File size: | 69'632 bytes |
MD5 hash: | 73C519F050C20580F8A62C849D49215A |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |