Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ce.vbs

Overview

General Information

Sample name:ce.vbs
Analysis ID:1559119
MD5:24a5eb1c1b75ab29f6c090f1038c3835
SHA1:edf754d24c9203b1ef43cc4b2493b6fd13b5b818
SHA256:20df5a030d038d90d345e184bb5413aeeb38cf1be522099ac4ea376c31195974
Tags:vbsuser-abuse_ch
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected VBS Downloader Generic
Connects to a pastebin service (likely for C&C)
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: WScript or CScript Dropper
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Found WSH timer for Javascript or VBS script (likely evasive script)
IP address seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Sigma detected: Script Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • wscript.exe (PID: 7772 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\ce.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
ce.vbsJoeSecurity_VBS_Downloader_GenericYara detected VBS Downloader GenericJoe Security

    System Summary

    barindex
    Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DesusertionIp: 188.114.97.3, DesusertionIsIpv6: false, DesusertionPort: 80, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 7772, Protocol: tcp, SourceIp: 192.168.2.9, SourceIsIpv6: false, SourcePort: 49708
    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\ce.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\ce.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3504, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\ce.vbs", ProcessId: 7772, ProcessName: wscript.exe
    Source: Network ConnectionAuthor: frack113: Data: DesusertionIp: 188.114.97.3, DesusertionIsIpv6: false, DesusertionPort: 80, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 7772, Protocol: tcp, SourceIp: 192.168.2.9, SourceIsIpv6: false, SourcePort: 49708
    Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\ce.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\ce.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3504, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\ce.vbs", ProcessId: 7772, ProcessName: wscript.exe
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: ce.vbsReversingLabs: Detection: 15%

    Spreading

    barindex
    Source: Yara matchFile source: ce.vbs, type: SAMPLE

    Networking

    barindex
    Source: C:\Windows\System32\wscript.exeNetwork Connect: 188.114.97.3 80Jump to behavior
    Source: unknownDNS query: name: paste.ee
    Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
    Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
    Source: global trafficHTTP traffic detected: GET /d/lxvbq HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Language: en-CHUser-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: paste.ee
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /d/lxvbq HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Language: en-CHUser-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: paste.ee
    Source: global trafficDNS traffic detected: DNS query: paste.ee
    Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Wed, 20 Nov 2024 07:05:52 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-aliveX-Frame-Options: SAMEORIGINReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DPWI2A7%2Fr5moo6CoyuSccoj%2FQ5gaa0Zaps2IAPCOLtft8KmzTiYR%2BrmRJhKTJFQZpUQFpo4ew%2FYarBHNsqVJMPWGHzrKBzKygUWZe1E6OfUUQAPqjIkr8hf%2FqA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e5698182ec60f77-EWRalt-svc: h3=":443"; ma=86400Data Raw: 31 31 35 35 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 67 74 20 49 45 20 38 5d 3e 3c 21 2d 2d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 2d 2d 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 53 75 73 70 65 63 74 65 64 20 70 68 69 73 68 69 6e 67 20 73 69 74 65 20 7c 20 43 6c 6f 75 64 66 6c 61 72 65 3c 2f 74 69 74 6c 65 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 45 64 67 65 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 2c 20 6e 6f 66 6f 6c 6c 6f 77 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 Data Ascii: 1155<!DOCTYPE html><!--[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]--><!--[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]--><!--[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]--><!--[if gt IE 8]><!--> <html class="no-js" lang="en-US"> <!--<![endif]--><head><title>Suspected phishing site | Cloudflare</title><meta charset="UTF-8" /><meta http-equiv="Content-Type" content
    Source: wscript.exe, 00000001.00000003.1527879991.000001A2E7877000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1531881786.000001A2E7877000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1529066840.000001A2E7877000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1529770711.000001A2E7877000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://paste.ee/3
    Source: wscript.exe, wscript.exe, 00000001.00000003.1527879991.000001A2E7877000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1531672482.000001A2E7822000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1529961735.000001A2E780F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1531881786.000001A2E7877000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1531819881.000001A2E785C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1529066840.000001A2E7877000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1528285020.000001A2E784B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1529770711.000001A2E7877000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1530479894.000001A2E7810000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1532219099.000001A2E7AEA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1532359925.000001A2E929A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1530699426.000001A2E7820000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1528519541.000001A2E785B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://paste.ee/d/lxvbq
    Source: wscript.exe, 00000001.00000002.1531819881.000001A2E785C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1528285020.000001A2E784B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1528519541.000001A2E785B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://paste.ee/d/lxvbqB
    Source: wscript.exe, 00000001.00000003.1530098553.000001A2E98C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://paste.ee/d/lxvbqx
    Source: wscript.exe, 00000001.00000002.1531693274.000001A2E783A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1528956533.000001A2E783A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1530579166.000001A2E783A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1530267097.000001A2E783A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://paste.ee:80/d/lxvbq
    Source: wscript.exe, 00000001.00000002.1531968529.000001A2E78BB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1529961735.000001A2E780F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1526680952.000001A2E78BB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1530643975.000001A2E78C4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1529384044.000001A2E78BB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1523193329.000001A2E786C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1530098553.000001A2E98C0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1530267097.000001A2E7831000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1531968529.000001A2E78C6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1527879991.000001A2E7871000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/5xx-error-landing
    Source: wscript.exe, wscript.exe, 00000001.00000002.1531968529.000001A2E78BB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1529961735.000001A2E780F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1526680952.000001A2E78BB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1530643975.000001A2E78C4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1529384044.000001A2E78BB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1523193329.000001A2E786C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1530098553.000001A2E98C0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1530267097.000001A2E7831000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1527879991.000001A2E7871000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/learning/access-management/phishing-attack/

    System Summary

    barindex
    Source: C:\Windows\System32\wscript.exeCOM Object queried: Server XML HTTP 6.0 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{88d96a0b-f192-11d4-a65f-0040963251e5}Jump to behavior
    Source: C:\Windows\System32\wscript.exeCOM Object queried: WinHttpRequest Component version 5.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{2087c2f4-2cef-4953-a8ab-66779b670495}Jump to behavior
    Source: ce.vbsInitial sample: Strings found which are bigger than 50
    Source: classification engineClassification label: mal80.spre.troj.evad.winVBS@1/0@1/1
    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\ce.vbs"
    Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: ce.vbsReversingLabs: Detection: 15%
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msxml6.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: winhttpcom.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Windows\System32\wscript.exe TID: 7828Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Windows\System32\wscript.exe TID: 7832Thread sleep time: -30000s >= -30000sJump to behavior
    Source: wscript.exe, 00000001.00000002.1531968529.000001A2E78BB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1526680952.000001A2E78BB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1529384044.000001A2E78BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWw
    Source: wscript.exe, 00000001.00000003.1529066840.000001A2E7862000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1531835499.000001A2E7862000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1523193329.000001A2E785D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
    Source: wscript.exe, 00000001.00000002.1531968529.000001A2E78BB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1526680952.000001A2E78BB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1529384044.000001A2E78BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\System32\wscript.exeNetwork Connect: 188.114.97.3 80Jump to behavior
    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information21
    Scripting
    Valid AccountsWindows Management Instrumentation21
    Scripting
    1
    Process Injection
    1
    Virtualization/Sandbox Evasion
    OS Credential Dumping1
    Security Software Discovery
    Remote ServicesData from Local System1
    Web Service
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/Job1
    DLL Side-Loading
    1
    DLL Side-Loading
    1
    Process Injection
    LSASS Memory1
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable Media3
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    DLL Side-Loading
    Security Account Manager2
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared Drive13
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Obfuscated Files or Information
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture3
    Ingress Tool Transfer
    Traffic DuplicationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    ce.vbs16%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    paste.ee
    188.114.97.3
    truefalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      https://www.cloudflare.com/learning/access-management/phishing-attack/wscript.exe, wscript.exe, 00000001.00000002.1531968529.000001A2E78BB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1529961735.000001A2E780F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1526680952.000001A2E78BB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1530643975.000001A2E78C4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1529384044.000001A2E78BB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1523193329.000001A2E786C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1530098553.000001A2E98C0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1530267097.000001A2E7831000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1527879991.000001A2E7871000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        http://paste.ee/3wscript.exe, 00000001.00000003.1527879991.000001A2E7877000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1531881786.000001A2E7877000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1529066840.000001A2E7877000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1529770711.000001A2E7877000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://paste.ee/d/lxvbqwscript.exe, wscript.exe, 00000001.00000003.1527879991.000001A2E7877000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1531672482.000001A2E7822000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1529961735.000001A2E780F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1531881786.000001A2E7877000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1531819881.000001A2E785C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1529066840.000001A2E7877000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1528285020.000001A2E784B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1529770711.000001A2E7877000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1530479894.000001A2E7810000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1532219099.000001A2E7AEA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1532359925.000001A2E929A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1530699426.000001A2E7820000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1528519541.000001A2E785B000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            http://paste.ee/d/lxvbqxwscript.exe, 00000001.00000003.1530098553.000001A2E98C0000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              http://paste.ee:80/d/lxvbqwscript.exe, 00000001.00000002.1531693274.000001A2E783A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1528956533.000001A2E783A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1530579166.000001A2E783A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1530267097.000001A2E783A000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                http://paste.ee/d/lxvbqBwscript.exe, 00000001.00000002.1531819881.000001A2E785C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1528285020.000001A2E784B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1528519541.000001A2E785B000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://www.cloudflare.com/5xx-error-landingwscript.exe, 00000001.00000002.1531968529.000001A2E78BB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1529961735.000001A2E780F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1526680952.000001A2E78BB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1530643975.000001A2E78C4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1529384044.000001A2E78BB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1523193329.000001A2E786C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1530098553.000001A2E98C0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1530267097.000001A2E7831000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1531968529.000001A2E78C6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1527879991.000001A2E7871000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    188.114.97.3
                    paste.eeEuropean Union
                    13335CLOUDFLARENETUSfalse
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1559119
                    Start date and time:2024-11-20 08:04:48 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 2m 52s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:5
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:ce.vbs
                    Detection:MAL
                    Classification:mal80.spre.troj.evad.winVBS@1/0@1/1
                    EGA Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Found application associated with file extension: .vbs
                    • Stop behavior analysis, all processes terminated
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
                    • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • VT rate limit hit for: ce.vbs
                    TimeTypeDescription
                    02:06:02API Interceptor2x Sleep call for process: wscript.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    188.114.97.3Label_00000852555.doc.jsGet hashmaliciousUnknownBrowse
                    • tamilandth.com/counter/?ad=1GNktTwWR98eDEMovFNDqyUPsyEdCxKRzC&id=LWkA9pJQhl9uXU1kaDN-eSC-55GNxzVDsLXZhtXL8Pr1j1FTCf4XAYGxA0VCjCQra2XwotFrDHGSYxM&rnd=25
                    PO 20495088.exeGet hashmaliciousFormBookBrowse
                    • www.ssrnoremt-rise.sbs/3jsc/
                    QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                    • filetransfer.io/data-package/zWkbOqX7/download
                    http://kklk16.bsyo45ksda.topGet hashmaliciousUnknownBrowse
                    • kklk16.bsyo45ksda.top/favicon.ico
                    gusetup.exeGet hashmaliciousUnknownBrowse
                    • www.glarysoft.com/update/glary-utilities/pro/pro50/
                    Online Interview Scheduling Form.lnkGet hashmaliciousDucktailBrowse
                    • gmtagency.online/api/check
                    View Pdf Doc_0b40e7d2137cd39647abbd9321b34da7.htmGet hashmaliciousUnknownBrowse
                    • f7xiz.nhgrt.top/Kbo731/96f7xiZ96?&&V5G=YW5kZXJzLmhhcnR1bmcuY2hyaXN0ZW5zZW5Acm9ja3dvb2wuY29t
                    SWIFT 103 202414111523339800 111124.pdf.vbsGet hashmaliciousRemcosBrowse
                    • paste.ee/d/YU1NN
                    TT copy.exeGet hashmaliciousFormBookBrowse
                    • www.lnnn.fun/u5w9/
                    QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                    • filetransfer.io/data-package/iiEh1iM3/download
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    paste.eedownload.exeGet hashmaliciousRemcos, XWormBrowse
                    • 188.114.97.3
                    SWIFT 103 202414111523339800 111124.pdf.vbsGet hashmaliciousRemcosBrowse
                    • 188.114.97.3
                    Yeni sipari#U015f _TR-59647-WJO-001.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 188.114.96.3
                    Scan12112024,pdf.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 188.114.97.3
                    Scan12112024,pdf.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 188.114.97.3
                    Scan112024.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 188.114.97.3
                    Consulta de encomenda N#U00ba TM06-Q2-11-24.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 188.114.96.3
                    Inquiry HA-22-28199 22-077.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 188.114.96.3
                    asegurar.vbsGet hashmaliciousRemcosBrowse
                    • 188.114.96.3
                    segura.vbsGet hashmaliciousAsyncRAT, DcRatBrowse
                    • 188.114.96.3
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    CLOUDFLARENETUSLabel_00000852555.doc.jsGet hashmaliciousUnknownBrowse
                    • 188.114.97.3
                    e-dekont_html.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 188.114.96.3
                    globe_product_order_korea_buy_20_11_2024_000000000000000000.vbsGet hashmaliciousGuLoader, RemcosBrowse
                    • 104.21.91.199
                    file.exeGet hashmaliciousLummaCBrowse
                    • 188.114.97.3
                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                    • 188.114.97.3
                    file.exeGet hashmaliciousLummaCBrowse
                    • 188.114.96.3
                    vessel details_pdf.exeGet hashmaliciousAgentTeslaBrowse
                    • 104.26.12.205
                    MV BUSAN STAR - calling to discharge about 55,000Mt of aggregates.exeGet hashmaliciousAgentTeslaBrowse
                    • 104.26.13.205
                    https://cdn-defac21.artcollective-snapclick.com/api/reg/update.jsonGet hashmaliciousUnknownBrowse
                    • 104.21.78.162
                    file.exeGet hashmaliciousLummaCBrowse
                    • 104.21.85.146
                    No context
                    No context
                    No created / dropped files found
                    File type:Unicode text, UTF-16, little-endian text, with very long lines (364), with CRLF line terminators
                    Entropy (8bit):3.5284222164561774
                    TrID:
                    • Text - UTF-16 (LE) encoded (2002/1) 64.44%
                    • MP3 audio (1001/1) 32.22%
                    • Lumena CEL bitmap (63/63) 2.03%
                    • Corel Photo Paint (41/41) 1.32%
                    File name:ce.vbs
                    File size:12'356 bytes
                    MD5:24a5eb1c1b75ab29f6c090f1038c3835
                    SHA1:edf754d24c9203b1ef43cc4b2493b6fd13b5b818
                    SHA256:20df5a030d038d90d345e184bb5413aeeb38cf1be522099ac4ea376c31195974
                    SHA512:fa101576f48116a45dd03fb4938023f3542b077492d0d1ff395a9f829c4b78ecaff247ad01ebb0769712057b620e6e9f853e2b11bd3a5d97fb0406a9239f5290
                    SSDEEP:192:PyUrlOx2qeAQm1CcUWgeAQZeyjzp+UhSAGGuGHRkfko:KURb3ODPwUgAuGHRk8o
                    TLSH:13425912A3FE4608F2F76F59597648284A37BD56597DD26C01AC284E0FF3E808935BB3
                    File Content Preview:..........F.u.n.c.t.i.o.n. .a.v.e.l.l.a.l.(.p.r.i.n.t.T.i.c.k.e.t.,. .s.c.r.i.p.t.C.o.n.t.e.x.t.,. .p.r.i.n.t.C.a.p.a.b.i.l.i.t.i.e.s.)..... . . . .D.i.m. .p.a.t.a.l.o.u.,. .t.e.m.p.e.r.a.n.t.e..... . . . .S.e.t. .p.a.t.a.l.o.u. .=. .p.r.i.n.t.C.a.p.a.b.i
                    Icon Hash:68d69b8f86ab9a86
                    TimestampSource PortDest PortSource IPDest IP
                    Nov 20, 2024 08:05:52.254348993 CET4970880192.168.2.9188.114.97.3
                    Nov 20, 2024 08:05:52.259223938 CET8049708188.114.97.3192.168.2.9
                    Nov 20, 2024 08:05:52.259320974 CET4970880192.168.2.9188.114.97.3
                    Nov 20, 2024 08:05:52.259581089 CET4970880192.168.2.9188.114.97.3
                    Nov 20, 2024 08:05:52.264355898 CET8049708188.114.97.3192.168.2.9
                    Nov 20, 2024 08:05:52.717988968 CET8049708188.114.97.3192.168.2.9
                    Nov 20, 2024 08:05:52.718004942 CET8049708188.114.97.3192.168.2.9
                    Nov 20, 2024 08:05:52.718024969 CET8049708188.114.97.3192.168.2.9
                    Nov 20, 2024 08:05:52.718038082 CET8049708188.114.97.3192.168.2.9
                    Nov 20, 2024 08:05:52.718049049 CET8049708188.114.97.3192.168.2.9
                    Nov 20, 2024 08:05:52.718130112 CET4970880192.168.2.9188.114.97.3
                    Nov 20, 2024 08:05:52.718172073 CET4970880192.168.2.9188.114.97.3
                    Nov 20, 2024 08:06:03.815524101 CET4970880192.168.2.9188.114.97.3
                    TimestampSource PortDest PortSource IPDest IP
                    Nov 20, 2024 08:05:52.232372046 CET5093853192.168.2.91.1.1.1
                    Nov 20, 2024 08:05:52.241688967 CET53509381.1.1.1192.168.2.9
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Nov 20, 2024 08:05:52.232372046 CET192.168.2.91.1.1.10x1a21Standard query (0)paste.eeA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Nov 20, 2024 08:05:52.241688967 CET1.1.1.1192.168.2.90x1a21No error (0)paste.ee188.114.97.3A (IP address)IN (0x0001)false
                    Nov 20, 2024 08:05:52.241688967 CET1.1.1.1192.168.2.90x1a21No error (0)paste.ee188.114.96.3A (IP address)IN (0x0001)false
                    • paste.ee
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.949708188.114.97.3807772C:\Windows\System32\wscript.exe
                    TimestampBytes transferredDirectionData
                    Nov 20, 2024 08:05:52.259581089 CET173OUTGET /d/lxvbq HTTP/1.1
                    Connection: Keep-Alive
                    Accept: */*
                    Accept-Language: en-CH
                    User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                    Host: paste.ee
                    Nov 20, 2024 08:05:52.717988968 CET1236INHTTP/1.1 403 Forbidden
                    Date: Wed, 20 Nov 2024 07:05:52 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    X-Frame-Options: SAMEORIGIN
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DPWI2A7%2Fr5moo6CoyuSccoj%2FQ5gaa0Zaps2IAPCOLtft8KmzTiYR%2BrmRJhKTJFQZpUQFpo4ew%2FYarBHNsqVJMPWGHzrKBzKygUWZe1E6OfUUQAPqjIkr8hf%2FqA%3D%3D"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8e5698182ec60f77-EWR
                    alt-svc: h3=":443"; ma=86400
                    Data Raw: 31 31 35 35 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 67 74 20 49 45 20 38 5d 3e 3c 21 2d 2d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 2d 2d 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 53 75 73 [TRUNCATED]
                    Data Ascii: 1155<!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if gt IE 8]>...> <html class="no-js" lang="en-US"> ...<![endif]--><head><title>Suspected phishing site | Cloudflare</title><meta charset="UTF-8" /><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta http-equiv="X-UA-Compatible" content="IE=Edge" /><meta name="robots" content="noindex, nofollow" /><meta name="viewport" content="width=device-width,initial-scale=1"
                    Nov 20, 2024 08:05:52.718004942 CET224INData Raw: 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 69 64 3d 22 63 66 5f 73 74 79 6c 65 73 2d 63 73 73 22 20 68 72 65 66 3d 22 2f 63 64 6e 2d 63 67 69 2f 73 74 79 6c 65 73 2f 63 66 2e 65 72 72 6f 72 73 2e 63 73 73 22 20
                    Data Ascii: /><link rel="stylesheet" id="cf_styles-css" href="/cdn-cgi/styles/cf.errors.css" />...[if lt IE 9]><link rel="stylesheet" id='cf_styles-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" /><![endif]--><style>body{margin:0;p
                    Nov 20, 2024 08:05:52.718024969 CET1236INData Raw: 61 64 64 69 6e 67 3a 30 7d 3c 2f 73 74 79 6c 65 3e 0a 0a 0a 3c 21 2d 2d 5b 69 66 20 67 74 65 20 49 45 20 31 30 5d 3e 3c 21 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 0a 20 20 69 66 20 28 21 6e 61 76 69 67 61 74 6f 72 2e 63 6f 6f 6b 69 65 45 6e 61 62 6c
                    Data Ascii: adding:0}</style>...[if gte IE 10]>...><script> if (!navigator.cookieEnabled) { window.addEventListener('DOMContentLoaded', function () { var cookieEl = document.getElementById('cookie-alert'); cookieEl.style.display =
                    Nov 20, 2024 08:05:52.718038082 CET1236INData Raw: 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 6c 65 61 72 6e 69 6e 67 2f 61 63 63 65 73 73 2d 6d 61 6e 61 67 65 6d 65 6e 74 2f
                    Data Ascii: <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/" class="cf-btn" style="background-color: #404040; color: #fff; border: 0;">Learn More</a> <form a
                    Nov 20, 2024 08:05:52.718049049 CET1105INData Raw: 65 6e 20 73 6d 3a 62 6c 6f 63 6b 20 73 6d 3a 6d 62 2d 31 22 3e 0a 20 20 20 20 20 20 59 6f 75 72 20 49 50 3a 0a 20 20 20 20 20 20 3c 62 75 74 74 6f 6e 20 74 79 70 65 3d 22 62 75 74 74 6f 6e 22 20 69 64 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 70 2d
                    Data Ascii: en sm:block sm:mb-1"> Your IP: <button type="button" id="cf-footer-ip-reveal" class="cf-footer-ip-reveal-btn">Click to reveal</button> <span class="hidden" id="cf-footer-ip">8.46.123.75</span> <span class="cf-footer-sep


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Target ID:1
                    Start time:02:05:50
                    Start date:20/11/2024
                    Path:C:\Windows\System32\wscript.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\ce.vbs"
                    Imagebase:0x7ff63ec80000
                    File size:170'496 bytes
                    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    No disassembly