Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Doc_14-58-28.js

Overview

General Information

Sample name:Doc_14-58-28.js
Analysis ID:1578372
MD5:9093eaea1e2a20feda386596ab77a6b6
SHA1:58b96ad4fa74d7b9b7f7f9fa6e5618d4f819c9df
SHA256:f5046c2f765a323c10bdbe38a89f9c94e820a4816fd9e27903a50576bec657d2
Tags:jsuser-pr0xylife
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Sigma detected: WScript or CScript Dropper
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Found WSH timer for Javascript or VBS script (likely evasive script)
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Sigma detected: Msiexec Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript

Classification

  • System is w10x64
  • wscript.exe (PID: 5668 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Doc_14-58-28.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • msiexec.exe (PID: 6392 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Doc_14-58-28.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Doc_14-58-28.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Doc_14-58-28.js", ProcessId: 5668, ProcessName: wscript.exe
Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 172.67.180.133, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\System32\msiexec.exe, Initiated: true, ProcessId: 6392, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49704
Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Doc_14-58-28.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Doc_14-58-28.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Doc_14-58-28.js", ProcessId: 5668, ProcessName: wscript.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: unknownHTTPS traffic detected: 172.67.180.133:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /mirabon.php HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows InstallerHost: luzazul.life
Source: global trafficDNS traffic detected: DNS query: luzazul.life
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 19 Dec 2024 15:14:01 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeX-Powered-By: PHP/8.1.29Cache-Control: no-storecf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BDIHVkYpUwDiZKrrZ%2F4kvzYlalDOz5Rehcj1gAysoYBL5pGYAGmkkA2kQUP9mCnrsLZQKjvmcl7DV2vSbIiK%2FH1Nx5UpAc2o29d1aId7Z8qx8v98j8OpqOgT86Ac8%2B4%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8f485703cb285e64-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1599&min_rtt=1595&rtt_var=606&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2826&recv_bytes=731&delivery_rate=1793611&cwnd=245&unsent_bytes=0&cid=5c1ca5bdff95b4d9&ts=1435&x=0"
Source: wscript.exe, 00000000.00000002.2150109866.0000029FE9DF0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2148833396.0000029FEA576000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://luzazul.life/mirabon.php
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownHTTPS traffic detected: 172.67.180.133:443 -> 192.168.2.5:49704 version: TLS 1.2

System Summary

barindex
Source: C:\Windows\System32\wscript.exeCOM Object queried: Microsoft Windows Installer HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{000C1090-0000-0000-C000-000000000046}Jump to behavior
Source: Doc_14-58-28.jsInitial sample: Strings found which are bigger than 50
Source: classification engineClassification label: mal48.winJS@2/0@1/1
Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Doc_14-58-28.js"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: C:\Windows\System32\msiexec.exe TID: 3136Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information2
Scripting
Valid AccountsWindows Management Instrumentation2
Scripting
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Process Injection
LSASS Memory2
System Information Discovery
Remote Desktop ProtocolData from Removable Media3
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive4
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture3
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Doc_14-58-28.js5%ReversingLabsScript-JS.Trojan.Latrodectus
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
luzazul.life
172.67.180.133
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://luzazul.life/mirabon.phpfalse
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      172.67.180.133
      luzazul.lifeUnited States
      13335CLOUDFLARENETUSfalse
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1578372
      Start date and time:2024-12-19 16:13:07 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 3m 59s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Run name:Without Instrumentation
      Number of analysed new started processes analysed:5
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:Doc_14-58-28.js
      Detection:MAL
      Classification:mal48.winJS@2/0@1/1
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .js
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
      • Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.245.163.56
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • VT rate limit hit for: Doc_14-58-28.js
      TimeTypeDescription
      10:14:01API Interceptor1x Sleep call for process: msiexec.exe modified
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      172.67.180.133https://www.bing.com/ck/a?!&&p=5d9f8e9c4e3f1c35JmltdHM9MTY4NzIxOTIwMCZpZ3VpZD0wODRmZmViYy1jM2I1LTY2MGYtMTJjMC1lZDhiYzI2NzY3Y2EmaW5zaWQ9NTE4Mg&ptn=3&hsh=3&fclid=084ffebc-c3b5-660f-12c0-ed8bc26767ca&u=a1aHR0cDovL3d3dy5sdXNoZWVwLm5ldC9wdWJsaWMvP3M9Z29vZHMvaW5kZXgvaWQvNC5odG1s#bXdoYWxsZXlAYWxrZWdlbi5jb20=Get hashmaliciousReCaptcha PhishBrowse
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        CLOUDFLARENETUSGioia Faggioli-End Of Year-Bonus.docxGet hashmaliciousUnknownBrowse
        • 172.67.134.110
        PURCHASE ORDER TRC-090971819130-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
        • 104.21.67.152
        PAYMENT ADVICE 750013-1012449943-81347-pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
        • 172.67.177.134
        Eallentoff_401k_1484013830.htmlGet hashmaliciousHTMLPhisherBrowse
        • 104.18.11.207
        Hkeyboard.dllGet hashmaliciousUnknownBrowse
        • 104.21.40.214
        powerpc.nn.elfGet hashmaliciousMirai, OkiruBrowse
        • 1.13.202.149
        Tii6ue74NB.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, RHADAMANTHYS, Stealc, VidarBrowse
        • 104.21.67.146
        Non-Disclosure Agreement.htmlGet hashmaliciousUnknownBrowse
        • 104.17.25.14
        rs.lnk.d.lnkGet hashmaliciousUnknownBrowse
        • 172.67.211.185
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        28a2c9bd18a11de089ef85a160da29e4F8HYX5HOgA.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
        • 172.67.180.133
        tmkSAOF3GM.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
        • 172.67.180.133
        JiZQEd33mn.exeGet hashmaliciousUnknownBrowse
        • 172.67.180.133
        urS3jQ9qb5.jarGet hashmaliciousCan StealerBrowse
        • 172.67.180.133
        https://walli.shanga.co/image/view/?id=1375Get hashmaliciousUnknownBrowse
        • 172.67.180.133
        Doc_16-48-43.jsGet hashmaliciousUnknownBrowse
        • 172.67.180.133
        Doc_16-48-43.jsGet hashmaliciousUnknownBrowse
        • 172.67.180.133
        Doc_23-03-27.jsGet hashmaliciousUnknownBrowse
        • 172.67.180.133
        Doc_23-03-27.jsGet hashmaliciousUnknownBrowse
        • 172.67.180.133
        No context
        No created / dropped files found
        File type:ASCII text, with very long lines (59763), with CRLF line terminators
        Entropy (8bit):3.865997293324707
        TrID:
          File name:Doc_14-58-28.js
          File size:333'655 bytes
          MD5:9093eaea1e2a20feda386596ab77a6b6
          SHA1:58b96ad4fa74d7b9b7f7f9fa6e5618d4f819c9df
          SHA256:f5046c2f765a323c10bdbe38a89f9c94e820a4816fd9e27903a50576bec657d2
          SHA512:1a359a64cb09388945261632d30fec20fe1fe8195f2ef397b18fe0de07cc686efb1d2f84f01b4ad80349235bb853f581ce433059bee825f417459af5fffeb5d2
          SSDEEP:3072:Scre/HxE8Mea7iIUc9ZgJr7oSMMsDpZgrGLuz61X82WWGZKxThgx+iV4NP/QCHfo:zWSYESeIlD
          TLSH:0D64935ED9046F7A27D27CB641786C3126D832D72070E89DBD8CF6CF435366A0B16D2A
          File Content Preview:var configvpn = "{\n \"layer_django_eventual50\": \"@t=SB\",\n \"API_session_numpy38\": {\n \"throughput_dummy_authentication97\": 5797,\n \"webpack_datadog85\": \"interface\",\n \"javascript_logstash_microservice00\": {\n
          Icon Hash:68d69b8bb6aa9a86
          TimestampSource PortDest PortSource IPDest IP
          Dec 19, 2024 16:13:59.403817892 CET49704443192.168.2.5172.67.180.133
          Dec 19, 2024 16:13:59.403866053 CET44349704172.67.180.133192.168.2.5
          Dec 19, 2024 16:13:59.403943062 CET49704443192.168.2.5172.67.180.133
          Dec 19, 2024 16:13:59.430478096 CET49704443192.168.2.5172.67.180.133
          Dec 19, 2024 16:13:59.430500984 CET44349704172.67.180.133192.168.2.5
          Dec 19, 2024 16:14:00.656574965 CET44349704172.67.180.133192.168.2.5
          Dec 19, 2024 16:14:00.656799078 CET49704443192.168.2.5172.67.180.133
          Dec 19, 2024 16:14:00.660748959 CET49704443192.168.2.5172.67.180.133
          Dec 19, 2024 16:14:00.660753965 CET44349704172.67.180.133192.168.2.5
          Dec 19, 2024 16:14:00.661164045 CET44349704172.67.180.133192.168.2.5
          Dec 19, 2024 16:14:00.710127115 CET49704443192.168.2.5172.67.180.133
          Dec 19, 2024 16:14:00.714754105 CET49704443192.168.2.5172.67.180.133
          Dec 19, 2024 16:14:00.759330034 CET44349704172.67.180.133192.168.2.5
          Dec 19, 2024 16:14:02.073282957 CET44349704172.67.180.133192.168.2.5
          Dec 19, 2024 16:14:02.073379993 CET44349704172.67.180.133192.168.2.5
          Dec 19, 2024 16:14:02.073488951 CET49704443192.168.2.5172.67.180.133
          Dec 19, 2024 16:14:02.075073957 CET49704443192.168.2.5172.67.180.133
          Dec 19, 2024 16:14:02.075099945 CET44349704172.67.180.133192.168.2.5
          Dec 19, 2024 16:14:02.075114965 CET49704443192.168.2.5172.67.180.133
          Dec 19, 2024 16:14:02.075120926 CET44349704172.67.180.133192.168.2.5
          TimestampSource PortDest PortSource IPDest IP
          Dec 19, 2024 16:13:59.132030010 CET5366653192.168.2.51.1.1.1
          Dec 19, 2024 16:13:59.395766973 CET53536661.1.1.1192.168.2.5
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Dec 19, 2024 16:13:59.132030010 CET192.168.2.51.1.1.10x81b2Standard query (0)luzazul.lifeA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Dec 19, 2024 16:13:59.395766973 CET1.1.1.1192.168.2.50x81b2No error (0)luzazul.life172.67.180.133A (IP address)IN (0x0001)false
          Dec 19, 2024 16:13:59.395766973 CET1.1.1.1192.168.2.50x81b2No error (0)luzazul.life104.21.80.119A (IP address)IN (0x0001)false
          • luzazul.life
          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.549704172.67.180.1334436392C:\Windows\System32\msiexec.exe
          TimestampBytes transferredDirectionData
          2024-12-19 15:14:00 UTC117OUTGET /mirabon.php HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Windows Installer
          Host: luzazul.life
          2024-12-19 15:14:02 UTC867INHTTP/1.1 404 Not Found
          Date: Thu, 19 Dec 2024 15:14:01 GMT
          Content-Type: text/html; charset=UTF-8
          Transfer-Encoding: chunked
          Connection: close
          X-Powered-By: PHP/8.1.29
          Cache-Control: no-store
          cf-cache-status: DYNAMIC
          vary: accept-encoding
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BDIHVkYpUwDiZKrrZ%2F4kvzYlalDOz5Rehcj1gAysoYBL5pGYAGmkkA2kQUP9mCnrsLZQKjvmcl7DV2vSbIiK%2FH1Nx5UpAc2o29d1aId7Z8qx8v98j8OpqOgT86Ac8%2B4%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 8f485703cb285e64-EWR
          alt-svc: h3=":443"; ma=86400
          server-timing: cfL4;desc="?proto=TCP&rtt=1599&min_rtt=1595&rtt_var=606&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2826&recv_bytes=731&delivery_rate=1793611&cwnd=245&unsent_bytes=0&cid=5c1ca5bdff95b4d9&ts=1435&x=0"
          2024-12-19 15:14:02 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:10:13:57
          Start date:19/12/2024
          Path:C:\Windows\System32\wscript.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Doc_14-58-28.js"
          Imagebase:0x7ff657cc0000
          File size:170'496 bytes
          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:1
          Start time:10:13:57
          Start date:19/12/2024
          Path:C:\Windows\System32\msiexec.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\msiexec.exe /V
          Imagebase:0x7ff759980000
          File size:69'632 bytes
          MD5 hash:E5DA170027542E25EDE42FC54C929077
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:false

          No disassembly