Edit tour

Windows Analysis Report
Update.js

Overview

General Information

Sample Name:Update.js
Analysis ID:1350012
MD5:5cff8061367f855b5386158f54eb39f7
SHA1:5e143bdf88f4c79814910b23a58f6ed04060ef1d
SHA256:c5e2e5af5b75b11da97e4e96e94dbc4e694ace6503e25ead473a05496e9519ec
Infos:

Detection

SocGholish
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected SocGholish
System process connects to network (likely due to code injection or exploit)
JScript performs obfuscated calls to suspicious functions
Snort IDS alert for network traffic
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Potential obfuscated javascript found
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
Uses a known web browser user agent for HTTP communication
Found WSH timer for Javascript or VBS script (likely evasive script)
Internet Provider seen in connection with other malware

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • wscript.exe (PID: 6180 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Update.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Update.jsJoeSecurity_SocGholishYara detected SocGholishJoe Security
    SourceRuleDescriptionAuthorStrings
    Process Memory Space: wscript.exe PID: 6180JoeSecurity_SocGholishYara detected SocGholishJoe Security
      No Sigma rule has matched
      Timestamp:192.168.2.51.1.1.164989532049293 11/29/23-17:42:13.526285
      SID:2049293
      Source Port:64989
      Destination Port:53
      Protocol:UDP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.523.146.184.71497044432049294 11/29/23-17:42:13.817351
      SID:2049294
      Source Port:49704
      Destination Port:443
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results
      Source: unknownHTTPS traffic detected: 23.146.184.71:443 -> 192.168.2.5:49704 version: TLS 1.2

      Networking

      barindex
      Source: C:\Windows\System32\wscript.exeNetwork Connect: 23.146.184.71 443Jump to behavior
      Source: TrafficSnort IDS: 2049293 ET TROJAN SocGholish CnC Domain in DNS Lookup (* .sync .oystergardens .club) 192.168.2.5:64989 -> 1.1.1.1:53
      Source: TrafficSnort IDS: 2049294 ET TROJAN SocGholish CnC Domain in TLS SNI (* .sync .oystergardens .club) 192.168.2.5:49704 -> 23.146.184.71:443
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: global trafficHTTP traffic detected: POST /editContent HTTP/1.1Accept: */*Upgrade-Insecure-Requests: 1Accept-Language: en-chUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: powvj.sync.oystergardens.clubContent-Length: 44Connection: Keep-AliveCache-Control: no-cache
      Source: Joe Sandbox ViewASN Name: KRAKR1901CA KRAKR1901CA
      Source: unknownDNS traffic detected: queries for: powvj.sync.oystergardens.club
      Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: wscript.exe, 00000000.00000003.2108832298.0000028A4439A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2108928982.0000028A443BA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2109539582.0000028A443BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
      Source: wscript.exe, 00000000.00000002.2134987151.0000028A44355000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2133012709.0000028A44355000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2109410459.0000028A44355000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2108692419.0000028A44355000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
      Source: wscript.exe, 00000000.00000003.2133745859.0000028A41BED000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2108911863.0000028A41BED000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2134705079.0000028A41BEF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2133109915.0000028A41BE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://powvj.sync.oystergardens.club/
      Source: wscript.exe, 00000000.00000002.2134640264.0000028A41BB8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://powvj.sync.oystergardens.club/editContent
      Source: wscript.exe, 00000000.00000003.2109282660.0000028A4439A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2108832298.0000028A4439A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://powvj.sync.oystergardens.club/editContent0z
      Source: wscript.exe, 00000000.00000003.2133109915.0000028A41BB1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2134640264.0000028A41BB8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://powvj.sync.oystergardens.club/editContentz_
      Source: wscript.exe, 00000000.00000003.2133745859.0000028A41BED000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2108911863.0000028A41BED000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2134705079.0000028A41BEF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2133109915.0000028A41BE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://powvj.sync.oystergardens.club/l
      Source: unknownHTTP traffic detected: POST /editContent HTTP/1.1Accept: */*Upgrade-Insecure-Requests: 1Accept-Language: en-chUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: powvj.sync.oystergardens.clubContent-Length: 44Connection: Keep-AliveCache-Control: no-cache
      Source: unknownHTTPS traffic detected: 23.146.184.71:443 -> 192.168.2.5:49704 version: TLS 1.2

      Key, Mouse, Clipboard, Microphone and Screen Capturing

      barindex
      Source: Yara matchFile source: Update.js, type: SAMPLE
      Source: Yara matchFile source: Process Memory Space: wscript.exe PID: 6180, type: MEMORYSTR

      System Summary

      barindex
      Source: C:\Windows\System32\wscript.exeCOM Object queried: XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{F6D90F16-9C73-11D3-B32E-00C04F990BB4}Jump to behavior
      Source: Update.jsInitial sample: Strings found which are bigger than 50
      Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: classification engineClassification label: mal80.troj.evad.winJS@1/0@1/1
      Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior

      Data Obfuscation

      barindex
      Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: setRequestHeader("Upgrade-Insecure-Requests", "1");IServerXMLHTTPRequest2.send("NfccspoUT5hqPvP65YN2LjK4scug6w3v62UDqHiRDQ==");<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html
      Source: Update.jsInitial file: High amount of function use 5
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
      Source: wscript.exe, 00000000.00000003.2133109915.0000028A41BB1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2134640264.0000028A41BB8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWpc
      Source: wscript.exe, 00000000.00000003.2133109915.0000028A41BB1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2133012709.0000028A44359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2109410459.0000028A44359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2109108957.0000028A44359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2108692419.0000028A44359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2134987151.0000028A44359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2134640264.0000028A41BB8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\System32\wscript.exeNetwork Connect: 23.146.184.71 443Jump to behavior
      Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: Update.js, type: SAMPLE
      Source: Yara matchFile source: Process Memory Space: wscript.exe PID: 6180, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: Update.js, type: SAMPLE
      Source: Yara matchFile source: Process Memory Space: wscript.exe PID: 6180, type: MEMORYSTR
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
      Valid Accounts22
      Scripting
      Path Interception1
      Process Injection
      1
      Process Injection
      OS Credential Dumping1
      Security Software Discovery
      Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
      Encrypted Channel
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts22
      Scripting
      LSASS Memory2
      System Information Discovery
      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
      Non-Application Layer Protocol
      SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
      Domain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      Obfuscated Files or Information
      Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration13
      Application Layer Protocol
      Data Encrypted for ImpactDNS ServerEmail Addresses
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1350012 Sample: Update.js Startdate: 29/11/2023 Architecture: WINDOWS Score: 80 10 powvj.sync.oystergardens.club 2->10 12 fp2e7a.wpc.phicdn.net 2->12 14 fp2e7a.wpc.2be4.phicdn.net 2->14 18 Snort IDS alert for network traffic 2->18 20 Yara detected SocGholish 2->20 22 Potential obfuscated javascript found 2->22 6 wscript.exe 1 12 2->6         started        signatures3 process4 dnsIp5 16 powvj.sync.oystergardens.club 23.146.184.71, 443, 49704 KRAKR1901CA Reserved 6->16 24 System process connects to network (likely due to code injection or exploit) 6->24 26 JScript performs obfuscated calls to suspicious functions 6->26 28 Windows Scripting host queries suspicious COM object (likely to drop second stage) 6->28 signatures6

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://powvj.sync.oystergardens.club/editContent0z0%Avira URL Cloudsafe
      https://powvj.sync.oystergardens.club/editContent0%Avira URL Cloudsafe
      http://www.microsoft.co0%Avira URL Cloudsafe
      https://powvj.sync.oystergardens.club/0%Avira URL Cloudsafe
      https://powvj.sync.oystergardens.club/l0%Avira URL Cloudsafe
      https://powvj.sync.oystergardens.club/editContentz_0%Avira URL Cloudsafe

      Download Network PCAP: filteredfull

      NameIPActiveMaliciousAntivirus DetectionReputation
      powvj.sync.oystergardens.club
      23.146.184.71
      truetrue
        unknown
        fp2e7a.wpc.phicdn.net
        192.229.211.108
        truefalse
          unknown
          NameMaliciousAntivirus DetectionReputation
          https://powvj.sync.oystergardens.club/editContenttrue
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://powvj.sync.oystergardens.club/lwscript.exe, 00000000.00000003.2133745859.0000028A41BED000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2108911863.0000028A41BED000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2134705079.0000028A41BEF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2133109915.0000028A41BE6000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://powvj.sync.oystergardens.club/wscript.exe, 00000000.00000003.2133745859.0000028A41BED000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2108911863.0000028A41BED000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2134705079.0000028A41BEF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2133109915.0000028A41BE6000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://powvj.sync.oystergardens.club/editContent0zwscript.exe, 00000000.00000003.2109282660.0000028A4439A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2108832298.0000028A4439A000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://powvj.sync.oystergardens.club/editContentz_wscript.exe, 00000000.00000003.2133109915.0000028A41BB1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.2134640264.0000028A41BB8000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.microsoft.cowscript.exe, 00000000.00000003.2108832298.0000028A4439A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2108928982.0000028A443BA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2109539582.0000028A443BA000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          IPDomainCountryFlagASNASN NameMalicious
          23.146.184.71
          powvj.sync.oystergardens.clubReserved
          398008KRAKR1901CAtrue
          Joe Sandbox Version:38.0.0 Ammolite
          Analysis ID:1350012
          Start date and time:2023-11-29 17:41:24 +01:00
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 2m 10s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Run name:Without Instrumentation
          Number of analysed new started processes analysed:2
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample file name:Update.js
          Detection:MAL
          Classification:mal80.troj.evad.winJS@1/0@1/1
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .js
          • Stop behavior analysis, all processes terminated
          • Exclude process from analysis (whitelisted): dllhost.exe
          • Excluded IPs from analysis (whitelisted): 40.127.169.103, 72.21.81.240, 20.166.126.56
          • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • VT rate limit hit for: Update.js
          No simulations
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          23.146.184.71Update.jsGet hashmaliciousSocGholishBrowse
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            fp2e7a.wpc.phicdn.netz1ORDENDECOMPRAURGENTEpdf.exeGet hashmaliciousFormBookBrowse
            • 192.229.211.108
            obaTzlGNzi.exeGet hashmaliciousXmrig, zgRATBrowse
            • 192.229.211.108
            qZTW6BQiPB.exeGet hashmaliciousGlupteba, LummaC Stealer, RedLine, SmokeLoader, XWorm, Xmrig, zgRATBrowse
            • 192.229.211.108
            QYwGwyYlrX.exeGet hashmaliciousRedLineBrowse
            • 192.229.211.108
            45UpZOZJdh.exeGet hashmaliciouszgRATBrowse
            • 192.229.211.108
            SyztrUVjX7.exeGet hashmaliciousGlupteba, LummaC Stealer, RedLine, SmokeLoader, XWorm, Xmrig, zgRATBrowse
            • 192.229.211.108
            TT_20191021122413_pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
            • 192.229.211.108
            SecuriteInfo.com.W32.MSIL_Kryptik.JQY.gen.Eldorado.24240.26222.exeGet hashmaliciousRedLineBrowse
            • 192.229.211.108
            RT4Rd1NAnN.docGet hashmaliciousUnknownBrowse
            • 192.229.211.108
            1701159485b8f61c507373bb39fba8685e79c9a315c4b263600ff92e635b9f2a87fb55bf5b140.dat-decoded.exeGet hashmaliciousXWormBrowse
            • 192.229.211.108
            TEKL#U0130F_TALEP_VE_F#U0130YAT_TEKL#U0130F#U0130_PDF.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
            • 192.229.211.108
            OF_23204368.exeGet hashmaliciousSnake KeyloggerBrowse
            • 192.229.211.108
            vHpbb4Bw72.exeGet hashmaliciousVidar, Xmrig, zgRATBrowse
            • 192.229.211.108
            k69S08SrKx.exeGet hashmaliciouszgRATBrowse
            • 192.229.211.108
            6h5wwsQiwN.exeGet hashmaliciousGuLoaderBrowse
            • 192.229.211.108
            SCO9.scr.exeGet hashmaliciouszgRATBrowse
            • 192.229.211.108
            file2data.exeGet hashmaliciousXWormBrowse
            • 192.229.211.108
            allegato_19.jsGet hashmaliciousUnknownBrowse
            • 192.229.211.108
            allegato_895.jsGet hashmaliciousUnknownBrowse
            • 192.229.211.108
            allegato_42.jsGet hashmaliciousUnknownBrowse
            • 192.229.211.108
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            KRAKR1901CAUpdate.jsGet hashmaliciousSocGholishBrowse
            • 23.146.184.71
            2d8a93ed-0e7f-42eb-9baa-63d58290d598_Update.jsGet hashmaliciousUnknownBrowse
            • 23.146.184.23
            Update.jsGet hashmaliciousUnknownBrowse
            • 23.146.184.23
            Update.jsGet hashmaliciousUnknownBrowse
            • 23.146.184.29
            Update.jsGet hashmaliciousUnknownBrowse
            • 23.146.184.29
            1.jsGet hashmaliciousUnknownBrowse
            • 23.146.184.29
            c7PZZNtiFl.elfGet hashmaliciousMiraiBrowse
            • 23.146.188.165
            31yJ3IUfUJGet hashmaliciousMiraiBrowse
            • 23.146.186.98
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            37f463bf4616ecd445d4a1937da06e19SecuriteInfo.com.Win32.Evo-gen.25090.7913.exeGet hashmaliciousGuLoaderBrowse
            • 23.146.184.71
            SecuriteInfo.com.Win32.Evo-gen.9086.10042.exeGet hashmaliciousGuLoaderBrowse
            • 23.146.184.71
            MAIL_PDF65674.msiGet hashmaliciousUnknownBrowse
            • 23.146.184.71
            rLiquidacionporFactorizaciondeCreditos.exeGet hashmaliciousGuLoaderBrowse
            • 23.146.184.71
            SM741AL3U8.exeGet hashmaliciousVidarBrowse
            • 23.146.184.71
            nodehost_UEv2.exeGet hashmaliciousRemcosBrowse
            • 23.146.184.71
            localadvancedv3.exeGet hashmaliciousRemcosBrowse
            • 23.146.184.71
            BgService_Gap_v5.exeGet hashmaliciousRemcosBrowse
            • 23.146.184.71
            4.vbsGet hashmaliciousUnknownBrowse
            • 23.146.184.71
            cjZol9SumT.exeGet hashmaliciousVidarBrowse
            • 23.146.184.71
            gCwjgRFmFP.exeGet hashmaliciousVidarBrowse
            • 23.146.184.71
            SyztrUVjX7.exeGet hashmaliciousGlupteba, LummaC Stealer, RedLine, SmokeLoader, XWorm, Xmrig, zgRATBrowse
            • 23.146.184.71
            7Uu5Xscq4d.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, PrivateLoader, RedLine, RisePro Stealer, SmokeLoaderBrowse
            • 23.146.184.71
            file.exeGet hashmaliciousBabuk, DjvuBrowse
            • 23.146.184.71
            file.exeGet hashmaliciousVidarBrowse
            • 23.146.184.71
            OCCT.exeGet hashmaliciousBazaLoader, PrivateLoaderBrowse
            • 23.146.184.71
            QGpUc9xZcU.exeGet hashmaliciousVidarBrowse
            • 23.146.184.71
            2023-11-24_155912-IMGx64_Your squirrel with love.exeGet hashmaliciousLummaC StealerBrowse
            • 23.146.184.71
            gbydriver.exeGet hashmaliciousRemcosBrowse
            • 23.146.184.71
            kft_Debug_test_v4.exeGet hashmaliciousRemcosBrowse
            • 23.146.184.71
            No context
            No created / dropped files found
            File type:ASCII text, with very long lines (5951), with no line terminators
            Entropy (8bit):5.504405724421129
            TrID:
              File name:Update.js
              File size:5'951 bytes
              MD5:5cff8061367f855b5386158f54eb39f7
              SHA1:5e143bdf88f4c79814910b23a58f6ed04060ef1d
              SHA256:c5e2e5af5b75b11da97e4e96e94dbc4e694ace6503e25ead473a05496e9519ec
              SHA512:a20633ec5e6053274bc426cd2ef5772cd719f6fbb81cff2b7f9cd53d445c9f128e33d96fdfd5df1808a8ac894c02a4004cb6b09c893417f987dfaf506e8d0ae5
              SSDEEP:96:ZvymAJPiUvka0xrBcy6wrB4y/HpyxqQ3ujQhLpyoa21CE42amqywKJjkRWC2Tpfk:Zv4JtvkagBQ+0bs324QWWdTpfWdkc4JK
              TLSH:63C102919BE0A49823E76713BF3DF1E8E80D684DB670089BE5515FE02D1541BD9E6F30
              File Content Preview://@cc_on@*//*@if(1){function a0_0x11d0(_0x498223,_0x559677){var _0x597f41=a0_0x597f();return a0_0x11d0=function(_0x11d095,_0xb83f82){_0x11d095=_0x11d095-0x13d;var _0x4154de=_0x597f41[_0x11d095];if(a0_0x11d0['vOSuiy']===undefined){var _0x5057c9=function(_0
              Icon Hash:68d69b8bb6aa9a86

              Download Network PCAP: filteredfull

              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
              192.168.2.51.1.1.164989532049293 11/29/23-17:42:13.526285UDP2049293ET TROJAN SocGholish CnC Domain in DNS Lookup (* .sync .oystergardens .club)6498953192.168.2.51.1.1.1
              192.168.2.523.146.184.71497044432049294 11/29/23-17:42:13.817351TCP2049294ET TROJAN SocGholish CnC Domain in TLS SNI (* .sync .oystergardens .club)49704443192.168.2.523.146.184.71
              • Total Packets: 16
              • 443 (HTTPS)
              • 53 (DNS)
              TimestampSource PortDest PortSource IPDest IP
              Nov 29, 2023 17:42:13.785043955 CET49704443192.168.2.523.146.184.71
              Nov 29, 2023 17:42:13.785095930 CET4434970423.146.184.71192.168.2.5
              Nov 29, 2023 17:42:13.785188913 CET49704443192.168.2.523.146.184.71
              Nov 29, 2023 17:42:13.817351103 CET49704443192.168.2.523.146.184.71
              Nov 29, 2023 17:42:13.817375898 CET4434970423.146.184.71192.168.2.5
              Nov 29, 2023 17:42:14.185997963 CET4434970423.146.184.71192.168.2.5
              Nov 29, 2023 17:42:14.186147928 CET49704443192.168.2.523.146.184.71
              Nov 29, 2023 17:42:14.307900906 CET49704443192.168.2.523.146.184.71
              Nov 29, 2023 17:42:14.307984114 CET4434970423.146.184.71192.168.2.5
              Nov 29, 2023 17:42:14.308355093 CET4434970423.146.184.71192.168.2.5
              Nov 29, 2023 17:42:14.308443069 CET49704443192.168.2.523.146.184.71
              Nov 29, 2023 17:42:14.315134048 CET49704443192.168.2.523.146.184.71
              Nov 29, 2023 17:42:14.315531015 CET49704443192.168.2.523.146.184.71
              Nov 29, 2023 17:42:14.315572023 CET4434970423.146.184.71192.168.2.5
              Nov 29, 2023 17:42:22.038984060 CET4434970423.146.184.71192.168.2.5
              Nov 29, 2023 17:42:22.039134026 CET49704443192.168.2.523.146.184.71
              Nov 29, 2023 17:42:22.039167881 CET4434970423.146.184.71192.168.2.5
              Nov 29, 2023 17:42:22.039225101 CET49704443192.168.2.523.146.184.71
              Nov 29, 2023 17:42:22.214806080 CET4434970423.146.184.71192.168.2.5
              Nov 29, 2023 17:42:22.214987993 CET4434970423.146.184.71192.168.2.5
              Nov 29, 2023 17:42:22.217206001 CET49704443192.168.2.523.146.184.71
              Nov 29, 2023 17:42:22.217206001 CET49704443192.168.2.523.146.184.71
              Nov 29, 2023 17:42:22.217343092 CET49704443192.168.2.523.146.184.71
              Nov 29, 2023 17:42:22.217360020 CET4434970423.146.184.71192.168.2.5
              Nov 29, 2023 17:42:22.217372894 CET49704443192.168.2.523.146.184.71
              Nov 29, 2023 17:42:22.217434883 CET49704443192.168.2.523.146.184.71
              TimestampSource PortDest PortSource IPDest IP
              Nov 29, 2023 17:42:13.526284933 CET6498953192.168.2.51.1.1.1
              Nov 29, 2023 17:42:13.761935949 CET53649891.1.1.1192.168.2.5
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Nov 29, 2023 17:42:13.526284933 CET192.168.2.51.1.1.10x2e01Standard query (0)powvj.sync.oystergardens.clubA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Nov 29, 2023 17:42:13.761935949 CET1.1.1.1192.168.2.50x2e01No error (0)powvj.sync.oystergardens.club23.146.184.71A (IP address)IN (0x0001)false
              Nov 29, 2023 17:42:31.587354898 CET1.1.1.1192.168.2.50x1311No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
              Nov 29, 2023 17:42:31.587354898 CET1.1.1.1192.168.2.50x1311No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
              • powvj.sync.oystergardens.club
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.54970423.146.184.714436180C:\Windows\System32\wscript.exe
              TimestampBytes transferredDirectionData
              2023-11-29 16:42:14 UTC420OUTPOST /editContent HTTP/1.1
              Accept: */*
              Upgrade-Insecure-Requests: 1
              Accept-Language: en-ch
              UA-CPU: AMD64
              Accept-Encoding: gzip, deflate
              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
              Host: powvj.sync.oystergardens.club
              Content-Length: 44
              Connection: Keep-Alive
              Cache-Control: no-cache
              2023-11-29 16:42:14 UTC44OUTData Raw: 4e 66 63 63 73 70 6f 55 54 35 68 71 50 76 50 36 35 59 4e 32 4c 6a 4b 34 73 63 75 67 36 77 33 76 36 32 55 44 71 48 69 52 44 51 3d 3d
              Data Ascii: NfccspoUT5hqPvP65YN2LjK4scug6w3v62UDqHiRDQ==
              2023-11-29 16:42:22 UTC165INData Raw: 48 54 54 50 2f 31 2e 31 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 53 65 72 76 65 72 3a 20 6e 67 69 6e 78 0d 0a 44 61 74 65 3a 20 57 65 64 2c 20 32 39 20 4e 6f 76 20 32 30 32 33 20 31 36 3a 34 32 3a 32 31 20 47 4d 54 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 0d 0a 54 72 61 6e 73 66 65 72 2d 45 6e 63 6f 64 69 6e 67 3a 20 63 68 75 6e 6b 65 64 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 63 6c 6f 73 65 0d 0a 0d 0a
              Data Ascii: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 29 Nov 2023 16:42:21 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: close
              2023-11-29 16:42:22 UTC209INData Raw: 63 62 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a
              Data Ascii: cb<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>
              2023-11-29 16:42:22 UTC5INData Raw: 30 0d 0a 0d 0a
              Data Ascii: 0


              051015s020406080100

              Click to jump to process

              051015s0.005101520MB

              Click to jump to process

              • File
              • Registry

              Click to dive into process behavior distribution

              Target ID:0
              Start time:17:42:11
              Start date:29/11/2023
              Path:C:\Windows\System32\wscript.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Update.js"
              Imagebase:0x7ff770c90000
              File size:170'496 bytes
              MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Reputation:moderate
              Has exited:true
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

              No disassembly