Windows
Analysis Report
6Y8CXBW7P6AR.JS
Overview
General Information
Sample name: | 6Y8CXBW7P6AR.JS |
Analysis ID: | 1377776 |
MD5: | e84710189e429a7edc2d1f3c5e580704 |
SHA1: | 6fe47a72184fd507c2389f79f5c4004d2dcd15cf |
SHA256: | b8ec8a571919af6a61834f75a9edde1ce299dcf39046bf18b8f78d83b38d4fec |
Infos: |
Detection
Score: | 60 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
- wscript.exe (PID: 6992 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\6Y8CX BW7P6AR.JS " MD5: A47CBE969EA935BDD3AB568BB126BC80) - wscript.exe (PID: 5400 cmdline:
C:\Windows \System32\ wscript.ex e" //B "C: \Users\use r\AppData\ Roaming\Or acleX\6Y8C XBW7P6AR.J S MD5: A47CBE969EA935BDD3AB568BB126BC80)
- cleanup
Persistence and Installation Behavior |
---|
Source: | Author: Joe Security: |
Click to jump to signature section
Source: | HTTPS traffic detected: |
Source: | JA3 fingerprint: |
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | COM Object queried: | Jump to behavior | ||
Source: | COM Object queried: | Jump to behavior | ||
Source: | COM Object queried: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Initial sample: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static file information: |
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | Window found: | Jump to behavior | ||
Source: | Window found: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process created: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact | Resource Development | Reconnaissance |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 11 Windows Management Instrumentation | 1 Registry Run Keys / Startup Folder | 11 Process Injection | 1 Masquerading | OS Credential Dumping | 121 Security Software Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | 1 Encrypted Channel | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Abuse Accessibility Features | Acquire Infrastructure | Gather Victim Identity Information |
Default Accounts | 12 Scripting | Boot or Logon Initialization Scripts | 1 Registry Run Keys / Startup Folder | 11 Process Injection | LSASS Memory | 1 File and Directory Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 1 Ingress Tool Transfer | SIM Card Swap | Obtain Device Cloud Backups | Network Denial of Service | Domains | Credentials |
Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 12 Scripting | Security Account Manager | 2 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 2 Non-Application Layer Protocol | Data Encrypted for Impact | DNS Server | Email Addresses | ||
Local Accounts | Cron | Login Hook | Login Hook | 1 Obfuscated Files or Information | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Traffic Duplication | 13 Application Layer Protocol | Data Destruction | Virtual Private Server | Employee Names |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
3% | ReversingLabs | Win32.Trojan.Generic |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
codeberg.org | 217.197.91.145 | true | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
217.197.91.145 | codeberg.org | Germany | 29670 | IN-BERLIN-ASIndividualNetworkBerlineVDE | false |
Joe Sandbox version: | 38.0.0 Ammolite |
Analysis ID: | 1377776 |
Start date and time: | 2024-01-19 23:12:57 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 42s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 6Y8CXBW7P6AR.JS |
Detection: | MAL |
Classification: | mal60.evad.winJS@3/4@1/1 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: 6Y8CXBW7P6AR.JS
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
217.197.91.145 | Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
codeberg.org | Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
IN-BERLIN-ASIndividualNetworkBerlineVDE | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | Fabookie | Browse |
| |
Get hash | malicious | Fabookie | Browse |
| ||
Get hash | malicious | Amadey, Fabookie, LummaC Stealer, RedLine, RisePro Stealer, Stealc | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | Glupteba, SmokeLoader, Socks5Systemz, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC, Babuk, Clipboard Hijacker, Djvu, LummaC Stealer, PureLog Stealer, RedLine | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | Amadey, Fabookie, LummaC Stealer, RedLine, Stealc | Browse |
| ||
Get hash | malicious | LummaC, Babuk, Djvu, LummaC Stealer, RedLine, RisePro Stealer, SmokeLoader | Browse |
| ||
Get hash | malicious | Fabookie | Browse |
| ||
Get hash | malicious | Fabookie | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Nanocore, AveMaria, GuLoader, MailPassView, Remcos | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, Babuk, Djvu, LummaC Stealer, RedLine, SmokeLoader | Browse |
| ||
Get hash | malicious | LummaC, Babuk, Djvu, LummaC Stealer, RedLine, SmokeLoader | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Process: | C:\Windows\System32\wscript.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 86 |
Entropy (8bit): | 4.6175569056133225 |
Encrypted: | false |
SSDEEP: | 3:qrPdn0FVVnQNM8KNExAJEW3n:aVn0vVnQNraExAJfn |
MD5: | F40D53C62C0D8551A3123EC0D347C269 |
SHA1: | 5F56B66259C3200346AC298F25C5B114C5D23054 |
SHA-256: | 3E68A5C5F076A9BA98AAD784FA5EEAD7FD26C8950D96416467BA7B2FC5790E20 |
SHA-512: | BCF378175C6C3041F90250F378F47FC357947B30D5822DA8F93B71C9634F2E530416F893A058030348BC35F674344D765B32DADB349D530D43DA7096E87E1325 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\wscript.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 3402150 |
Entropy (8bit): | 3.260667702995008 |
Encrypted: | false |
SSDEEP: | 24576:YA6Uh8WwLLYKRZs80EpAmB0kW7tw057SYOKvpUMTxb9/dRDBURyu8OFK5oAgpEZ9:B |
MD5: | E84710189E429A7EDC2D1F3C5E580704 |
SHA1: | 6FE47A72184FD507C2389F79F5C4004D2DCD15CF |
SHA-256: | B8EC8A571919AF6A61834F75A9EDDE1CE299DCF39046BF18B8F78D83B38D4FEC |
SHA-512: | CEDF5EF56DC62FE5DDBC88766C929B5093DF4E49B7B195016ACF59146E91F246EE8D68361B30900C51DDABD683E4F3928D32A7F5C4540F464A206048A8CC4132 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\wscript.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\System32\wscript.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 88 |
Entropy (8bit): | 4.691830766118723 |
Encrypted: | false |
SSDEEP: | 3:qrPdn0FVVnQNM8KNExAJEW3ov:aVn0vVnQNraExAJfy |
MD5: | 2557FE225E15B46D46C585AC56A99600 |
SHA1: | FA398D8C97E31697A5A266A2CDFFD53813E64BFD |
SHA-256: | 805832E0E1FEF7064021C751C7C28E7E42712D074EE447823C5DBD9E448EFB12 |
SHA-512: | 26A56B2E4DE99F4762890BBE27F8803D0A07562065FB32E1BF43818C02840B4E783DE39C95334B58A5A21D670A4D002614496E5302916E476B40D67C67D467E8 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 3.260667702995008 |
TrID: | |
File name: | 6Y8CXBW7P6AR.JS |
File size: | 3'402'150 bytes |
MD5: | e84710189e429a7edc2d1f3c5e580704 |
SHA1: | 6fe47a72184fd507c2389f79f5c4004d2dcd15cf |
SHA256: | b8ec8a571919af6a61834f75a9edde1ce299dcf39046bf18b8f78d83b38d4fec |
SHA512: | cedf5ef56dc62fe5ddbc88766c929b5093df4e49b7b195016acf59146e91f246ee8d68361b30900c51ddabd683e4f3928d32a7f5c4540f464a206048a8cc4132 |
SSDEEP: | 24576:YA6Uh8WwLLYKRZs80EpAmB0kW7tw057SYOKvpUMTxb9/dRDBURyu8OFK5oAgpEZ9:B |
TLSH: | 2EF52C985785CC176A8D4D83AF06BFE65036B266ABEC31C79578BBCC05E90D38499CCC |
File Content Preview: | try{var LGWOJDTVCFGM = ["\x49\x48\x5A\x68\x63\x69\x42\x4C\x53\x45\x2A\x54\x56\x31\x46\x52\x55\x55\x51\x39\x57\x79\x49\x69\x4C\x43\x4A\x75\x55\x6E\x2A\x70\x4A\x33\x46\x4A\x64\x47\x59\x2F\x56\x44\x64\x47\x63\x48\x73\x78\x53\x43\x56\x68\x58\x43\x49\x7A\x4F\x |
Icon Hash: | 68d69b8bb6aa9a86 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 19, 2024 23:13:38.718293905 CET | 49723 | 443 | 192.168.2.16 | 217.197.91.145 |
Jan 19, 2024 23:13:38.718326092 CET | 443 | 49723 | 217.197.91.145 | 192.168.2.16 |
Jan 19, 2024 23:13:38.718415022 CET | 49723 | 443 | 192.168.2.16 | 217.197.91.145 |
Jan 19, 2024 23:13:38.731555939 CET | 49723 | 443 | 192.168.2.16 | 217.197.91.145 |
Jan 19, 2024 23:13:38.731570005 CET | 443 | 49723 | 217.197.91.145 | 192.168.2.16 |
Jan 19, 2024 23:13:39.180469990 CET | 443 | 49723 | 217.197.91.145 | 192.168.2.16 |
Jan 19, 2024 23:13:39.180615902 CET | 49723 | 443 | 192.168.2.16 | 217.197.91.145 |
Jan 19, 2024 23:13:39.279869080 CET | 49723 | 443 | 192.168.2.16 | 217.197.91.145 |
Jan 19, 2024 23:13:39.279912949 CET | 443 | 49723 | 217.197.91.145 | 192.168.2.16 |
Jan 19, 2024 23:13:39.280411005 CET | 443 | 49723 | 217.197.91.145 | 192.168.2.16 |
Jan 19, 2024 23:13:39.280479908 CET | 49723 | 443 | 192.168.2.16 | 217.197.91.145 |
Jan 19, 2024 23:13:39.284190893 CET | 49723 | 443 | 192.168.2.16 | 217.197.91.145 |
Jan 19, 2024 23:13:39.325949907 CET | 443 | 49723 | 217.197.91.145 | 192.168.2.16 |
Jan 19, 2024 23:13:39.687855959 CET | 443 | 49723 | 217.197.91.145 | 192.168.2.16 |
Jan 19, 2024 23:13:39.687956095 CET | 49723 | 443 | 192.168.2.16 | 217.197.91.145 |
Jan 19, 2024 23:13:39.687978983 CET | 443 | 49723 | 217.197.91.145 | 192.168.2.16 |
Jan 19, 2024 23:13:39.688040018 CET | 49723 | 443 | 192.168.2.16 | 217.197.91.145 |
Jan 19, 2024 23:13:39.688049078 CET | 443 | 49723 | 217.197.91.145 | 192.168.2.16 |
Jan 19, 2024 23:13:39.688138962 CET | 49723 | 443 | 192.168.2.16 | 217.197.91.145 |
Jan 19, 2024 23:13:39.692174911 CET | 49723 | 443 | 192.168.2.16 | 217.197.91.145 |
Jan 19, 2024 23:13:39.692190886 CET | 443 | 49723 | 217.197.91.145 | 192.168.2.16 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 19, 2024 23:13:38.589545012 CET | 50240 | 53 | 192.168.2.16 | 1.1.1.1 |
Jan 19, 2024 23:13:38.709443092 CET | 53 | 50240 | 1.1.1.1 | 192.168.2.16 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 19, 2024 23:13:38.589545012 CET | 192.168.2.16 | 1.1.1.1 | 0x8f49 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 19, 2024 23:13:38.709443092 CET | 1.1.1.1 | 192.168.2.16 | 0x8f49 | No error (0) | 217.197.91.145 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.16 | 49723 | 217.197.91.145 | 443 | 6992 | C:\Windows\System32\wscript.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-01-19 22:13:39 UTC | 374 | OUT | |
2024-01-19 22:13:39 UTC | 833 | IN | |
2024-01-19 22:13:39 UTC | 86 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 23:13:32 |
Start date: | 19/01/2024 |
Path: | C:\Windows\System32\wscript.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6bb6b0000 |
File size: | 170'496 bytes |
MD5 hash: | A47CBE969EA935BDD3AB568BB126BC80 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 23:13:39 |
Start date: | 19/01/2024 |
Path: | C:\Windows\System32\wscript.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6bb6b0000 |
File size: | 170'496 bytes |
MD5 hash: | A47CBE969EA935BDD3AB568BB126BC80 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |