Create Interactive Tour

Windows Analysis Report
Nuke-Reddit-History.js

Overview

General Information

Sample Name:Nuke-Reddit-History.js
Analysis ID:640053
MD5:d814539d5dbda91921252f4282974468
SHA1:96df0254c2eae0744a9258bce2176688e34b09ae
SHA256:d3feb59022e9692dc1d98d412a33544613d6c701d349f615af84890e0042b0cb
Tags:chrome

Detection

Score:21
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Potential obfuscated javascript found
Program does not show much activity (idle)
Java / VBScript file with very long strings (likely obfuscated code)
Found WSH timer for Javascript or VBS script (likely evasive script)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • wscript.exe (PID: 2760 cmdline: C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\Nuke-Reddit-History.js" MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: wscript.exe, 00000000.00000003.368541170.00000295E9D66000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.357098385.00000295E9D65000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.368281029.00000295E9B1E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.368774532.00000295E9EA6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.357303708.00000295E9EAE000.00000004.00000020.00020000.00000000.sdmp, Nuke-Reddit-History.jsString found in binary or memory: https://feross.org
Source: Nuke-Reddit-History.jsInitial sample: Strings found which are bigger than 50
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: classification engineClassification label: sus21.evad.winJS@1/0@0/0

Data Obfuscation

barindex
Source: Nuke-Reddit-History.jsInitial file: High amount of function use 529
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts12
Scripting
Path InterceptionPath Interception12
Scripting
OS Credential Dumping2
System Information Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Obfuscated Files or Information
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 640053 Sample: Nuke-Reddit-History.js Startdate: 06/06/2022 Architecture: WINDOWS Score: 21 7 Potential obfuscated javascript found 2->7 5 wscript.exe 2->5         started        process3

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Nuke-Reddit-History.js0%VirustotalBrowse
Nuke-Reddit-History.js0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://feross.orgwscript.exe, 00000000.00000003.368541170.00000295E9D66000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.357098385.00000295E9D65000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.368281029.00000295E9B1E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.368774532.00000295E9EA6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.357303708.00000295E9EAE000.00000004.00000020.00020000.00000000.sdmp, Nuke-Reddit-History.jsfalse
    high
    No contacted IP infos
    Joe Sandbox Version:35.0.0 Citrine
    Analysis ID:640053
    Start date and time: 06/06/202219:30:282022-06-06 19:30:28 +02:00
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 6m 42s
    Hypervisor based Inspection enabled:false
    Report type:full
    Sample file name:Nuke-Reddit-History.js
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Number of analysed new started processes analysed:21
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:SUS
    Classification:sus21.evad.winJS@1/0@0/0
    EGA Information:Failed
    HDC Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .js
    • Adjust boot time
    • Enable AMSI
    • Override analysis time to 240s for JS/VBS files not yet terminated
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
    • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtProtectVirtualMemory calls found.
    No simulations
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:ASCII text, with very long lines
    Entropy (8bit):5.936318464301515
    TrID:
    • Java Script (12010/1) 100.00%
    File name:Nuke-Reddit-History.js
    File size:638350
    MD5:d814539d5dbda91921252f4282974468
    SHA1:96df0254c2eae0744a9258bce2176688e34b09ae
    SHA256:d3feb59022e9692dc1d98d412a33544613d6c701d349f615af84890e0042b0cb
    SHA512:d0c90cb5c3b0d1bec215cd37434ffd91b38d1a05dea69cf7cb7f0e9a88289e0bea1f1b8ba3d587f55363796bc8a2f7761cb2693bc39541be23478bd268180492
    SSDEEP:12288:S8WG3uSgPFJc/3lcvgE0psrSdkhqgAtpVlezpE6GW:SCi
    TLSH:17D42A76EF05689E8FEE1972F1CE599B972A56470D1240CCD1CBE0872875C0ED398E2E
    File Content Preview:!function(e){var t={};function n(r){if(t[r])return t[r].exports;var o=t[r]={i:r,l:!1,exports:{}};return e[r].call(o.exports,o,o.exports,n),o.l=!0,o.exports}n.m=e,n.c=t,n.d=function(e,t,r){n.o(e,t)||Object.defineProperty(e,t,{enumerable:!0,get:r})},n.r=fun
    Icon Hash:e8d69ece968a9ec4
    No network behavior found
    050100150200250s020406080100

    Click to jump to process

    050100150200250sMB

    Click to jump to process

    • File
    • Registry

    Click to dive into process behavior distribution

    Target ID:0
    Start time:19:31:32
    Start date:06/06/2022
    Path:C:\Windows\System32\wscript.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\Nuke-Reddit-History.js"
    Imagebase:0x7ff666770000
    File size:163840 bytes
    MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

    No disassembly