Windows
Analysis Report
openreach network services agreement 62586.js
Overview
General Information
Detection
Score: | 52 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
JScript performs obfuscated calls to suspicious functions
Potential evasive JS / VBS script found (domain check)
Java / VBScript file with very long strings (likely obfuscated code)
Creates COM task schedule object (often to register a task for autostart)
Found WSH timer for Javascript or VBS script (likely evasive script)
Abnormal high CPU Usage
Classification
- System is w10x64_ra
wscript.exe (PID: 3132 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\openr each netwo rk service s agreemen t 62586.js " MD5: 563EDAE37876138FDFF47F3E7A9A78FD)
- cleanup
⊘No configs have been found
⊘No yara matches
⊘No Sigma rule has matched
⊘No Snort rule has matched
- • Spreading
- • Networking
- • System Summary
- • Data Obfuscation
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
Show All Signature Results
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Initial sample: |
Source: | Process Stats: |
Source: | Key opened: | Jump to behavior |
Source: | Classification label: |
Source: | Key value queried: | Jump to behavior |
Source: | File created: | Jump to behavior |
Data Obfuscation |
---|
Source: | Anti Malware Scan Interface: |