Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Update.js

Overview

General Information

Sample name:Update.js
Analysis ID:1520587
MD5:25f77d065e86649afff03a1ac4791f52
SHA1:6cbf2d9fe70da875f726eaaf39a5e6f593df85c2
SHA256:0c39052a52eda424ffef8dc4e230e17a142b1e6239ada891fb3a0946a501e4ae
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: WScript or CScript Dropper
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Found WSH timer for Javascript or VBS script (likely evasive script)
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
Sigma detected: Script Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript

Classification

  • System is w10x64
  • wscript.exe (PID: 7428 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Update.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 79.141.163.131, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 7428, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Update.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Update.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Update.js", ProcessId: 7428, ProcessName: wscript.exe
Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 79.141.163.131, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 7428, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Update.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Update.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Update.js", ProcessId: 7428, ProcessName: wscript.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-09-27T16:09:09.802854+020020561791Exploit Kit Activity Detected192.168.2.4580511.1.1.153UDP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-09-27T16:09:52.573726+020020561801Exploit Kit Activity Detected192.168.2.44973079.141.163.131443TCP
2024-09-27T16:10:35.389939+020020561801Exploit Kit Activity Detected192.168.2.44973779.141.163.131443TCP

Click to jump to signature section

Show All Signature Results

Networking

barindex
Source: Network trafficSuricata IDS: 2056180 - Severity 1 - ET EXPLOIT_KIT ZPHP Domain in TLS SNI (roadrunnersell .com) : 192.168.2.4:49730 -> 79.141.163.131:443
Source: Network trafficSuricata IDS: 2056179 - Severity 1 - ET EXPLOIT_KIT ZPHP Domain in DNS Lookup (roadrunnersell .com) : 192.168.2.4:58051 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2056180 - Severity 1 - ET EXPLOIT_KIT ZPHP Domain in TLS SNI (roadrunnersell .com) : 192.168.2.4:49737 -> 79.141.163.131:443
Source: C:\Windows\System32\wscript.exeNetwork Connect: 79.141.163.131 443Jump to behavior
Source: Joe Sandbox ViewASN Name: HZ-US-ASBG HZ-US-ASBG
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: roadrunnersell.com
Source: wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://0.30000000000000004.com/
Source: wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://stat.ethz.ch/R-manual/R-devel/library/grDevices/html/boxplot.stats.html
Source: wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/API/CanvasRenderingContext2D/Variable1CompositeOperatio
Source: wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/Events/mousewheel)
Source: wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://echarts.apache.org/examples/en/editor.html?c=custom-gantt-flight
Source: wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/apache/echarts/issues/14266
Source: wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/apache/incubator-echarts/issues/11369
Source: wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/apache/incubator-echarts/issues/12229
Source: wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/d3/d3-hierarchy/blob/4c1f038f2725d6eae2e49b61d01456400694bac4/src/tree.js
Source: wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/d3/d3/blob/9cc9a875e636a1dcf36cc1e07bdf77e1ad6e2c74/src/arrays/quantile.js
Source: wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/d3/d3/blob/9cc9a875e636a1dcf36cc1e07bdf77e1ad6e2c74/src/layout/treemap.js
Source: wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/d3/d3/blob/b516d77fb8566b576088e73410437494717ada26/src/layout/force.js
Source: wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/d3/d3/blob/b516d77fb8566b576088e73410437494717ada26/src/time/scale.js
Source: wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/ecomfe/zrender/blob/master/LICENSE.txt
Source: wscript.exe, 00000000.00000003.2621169719.000002818FA0A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1702807223.0000028188911000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1707444503.0000028188951000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, Update.jsString found in binary or memory: https://github.com/google/closure-library/wiki/goog.module:-an-ES6-module-like-alternative-to-goog.p
Source: wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://graphics.ethz.ch/teaching/scivis_common/Literature/squarifiedTreeMaps.pdf
Source: wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jsbench.me/2vkpcekkvw/1)
Source: wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jsperf.com/try-catch-performance-overhead
Source: wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://momentjs.com/
Source: wscript.exe, 00000000.00000003.2608386580.0000028186C56000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2571975946.0000028186C11000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2572364520.0000028186C66000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2571895557.0000028186C66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://roadrunnersell.com/
Source: wscript.exe, 00000000.00000003.2608386580.0000028186C56000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2572364520.0000028186C66000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2571895557.0000028186C66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://roadrunnersell.com/qL
Source: wscript.exe, wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2619276208.000002818D1B4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2621169719.000002818FA0A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2571975946.0000028186C11000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2608386580.0000028186C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2572364520.0000028186C66000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2616655913.000002818ED1F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1706648325.000002818C11D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2617244155.0000028188BF1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2571895557.0000028186C66000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2618831195.0000028188BF1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2616586676.000002818ED1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://roadrunnersell.com/trade/fix.php?624
Source: wscript.exe, 00000000.00000003.2571975946.0000028186C11000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2608386580.0000028186C27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://roadrunnersell.com/trade/fix.php?6242d4
Source: wscript.exe, 00000000.00000003.2621169719.000002818FA0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://roadrunnersell.com/trade/fix.php?624p
Source: wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tc39.github.io/ecma262/#sec-daylight-saving-time-adjustment).
Source: wscript.exe, 00000000.00000003.2621169719.000002818FA0A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, Update.jsString found in binary or memory: https://www-googleapis-staging.sandbox.google.com
Source: wscript.exe, 00000000.00000003.1707036235.0000028188B53000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www-googleapis-staging.sandbox.google.com(
Source: wscript.exe, 00000000.00000003.2621169719.000002818FA0A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1706818670.000002818C07D000.00000004.00000020.00020000.00000000.sdmp, Update.jsString found in binary or memory: https://www.google.com/intl/en-US/chrome/blank.html
Source: wscript.exe, 00000000.00000003.2621169719.000002818FA0A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, Update.jsString found in binary or memory: https://www.googleapis.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443

System Summary

barindex
Source: C:\Windows\System32\wscript.exeCOM Object queried: XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{F6D90F16-9C73-11D3-B32E-00C04F990BB4}Jump to behavior
Source: Update.jsInitial sample: Strings found which are bigger than 50
Source: classification engineClassification label: mal68.evad.winJS@1/0@1/1
Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
Source: Update.jsStatic file information: File size 6980191 > 1048576
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: wscript.exe, 00000000.00000003.1704907771.000002818E0B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMCiVM
Source: wscript.exe, 00000000.00000003.2571975946.0000028186C46000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2608386580.0000028186C46000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2572364520.0000028186C76000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2571975946.0000028186C11000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2608386580.0000028186C76000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2608386580.0000028186C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2571895557.0000028186C76000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\wscript.exeNetwork Connect: 79.141.163.131 443Jump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information2
Scripting
Valid AccountsWindows Management Instrumentation2
Scripting
1
Process Injection
1
Process Injection
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory2
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
roadrunnersell.com
79.141.163.131
truetrue
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://github.com/apache/incubator-echarts/issues/11369wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      https://roadrunnersell.com/qLwscript.exe, 00000000.00000003.2608386580.0000028186C56000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2572364520.0000028186C66000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2571895557.0000028186C66000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        http://www.apache.org/licenses/LICENSE-2.0wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://github.com/google/closure-library/wiki/goog.module:-an-ES6-module-like-alternative-to-goog.pwscript.exe, 00000000.00000003.2621169719.000002818FA0A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1702807223.0000028188911000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1707444503.0000028188951000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, Update.jsfalse
            unknown
            https://www.google.com/intl/en-US/chrome/blank.htmlwscript.exe, 00000000.00000003.2621169719.000002818FA0A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1706818670.000002818C07D000.00000004.00000020.00020000.00000000.sdmp, Update.jsfalse
              unknown
              https://roadrunnersell.com/wscript.exe, 00000000.00000003.2608386580.0000028186C56000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2571975946.0000028186C11000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2572364520.0000028186C66000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2571895557.0000028186C66000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://github.com/apache/echarts/issues/14266wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://github.com/d3/d3/blob/b516d77fb8566b576088e73410437494717ada26/src/layout/force.jswscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://jsperf.com/try-catch-performance-overheadwscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      https://jsbench.me/2vkpcekkvw/1)wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        https://roadrunnersell.com/trade/fix.php?6242d4wscript.exe, 00000000.00000003.2571975946.0000028186C11000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2608386580.0000028186C27000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://0.30000000000000004.com/wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            https://github.com/d3/d3/blob/b516d77fb8566b576088e73410437494717ada26/src/time/scale.jswscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              https://roadrunnersell.com/trade/fix.php?624pwscript.exe, 00000000.00000003.2621169719.000002818FA0A000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                https://momentjs.com/wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  https://developer.mozilla.org/en-US/docs/Web/API/CanvasRenderingContext2D/Variable1CompositeOperatiowscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    https://developer.mozilla.org/en-US/docs/Web/Events/mousewheel)wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      https://github.com/apache/incubator-echarts/issues/12229wscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        https://github.com/d3/d3-hierarchy/blob/4c1f038f2725d6eae2e49b61d01456400694bac4/src/tree.jswscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          https://echarts.apache.org/examples/en/editor.html?c=custom-gantt-flightwscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            https://roadrunnersell.com/trade/fix.php?624wscript.exe, wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2619276208.000002818D1B4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2621169719.000002818FA0A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2571975946.0000028186C11000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2608386580.0000028186C27000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2572364520.0000028186C66000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2616655913.000002818ED1F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1706648325.000002818C11D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2617244155.0000028188BF1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2571895557.0000028186C66000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2618831195.0000028188BF1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2616586676.000002818ED1B000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              https://graphics.ethz.ch/teaching/scivis_common/Literature/squarifiedTreeMaps.pdfwscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                https://github.com/ecomfe/zrender/blob/master/LICENSE.txtwscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  https://tc39.github.io/ecma262/#sec-daylight-saving-time-adjustment).wscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://www-googleapis-staging.sandbox.google.com(wscript.exe, 00000000.00000003.1707036235.0000028188B53000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      https://www-googleapis-staging.sandbox.google.comwscript.exe, 00000000.00000003.2621169719.000002818FA0A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, Update.jsfalse
                                                        unknown
                                                        https://github.com/d3/d3/blob/9cc9a875e636a1dcf36cc1e07bdf77e1ad6e2c74/src/arrays/quantile.jswscript.exe, 00000000.00000003.1698024588.000002818B157000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818A3F9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          unknown
                                                          https://github.com/d3/d3/blob/9cc9a875e636a1dcf36cc1e07bdf77e1ad6e2c74/src/layout/treemap.jswscript.exe, 00000000.00000003.1698024588.000002818BB57000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1697456153.0000028189D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1696651746.000002818ADF9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            unknown
                                                            • No. of IPs < 25%
                                                            • 25% < No. of IPs < 50%
                                                            • 50% < No. of IPs < 75%
                                                            • 75% < No. of IPs
                                                            IPDomainCountryFlagASNASN NameMalicious
                                                            79.141.163.131
                                                            roadrunnersell.comBulgaria
                                                            202015HZ-US-ASBGtrue
                                                            Joe Sandbox version:41.0.0 Charoite
                                                            Analysis ID:1520587
                                                            Start date and time:2024-09-27 16:08:13 +02:00
                                                            Joe Sandbox product:CloudBasic
                                                            Overall analysis duration:0h 5m 26s
                                                            Hypervisor based Inspection enabled:false
                                                            Report type:full
                                                            Cookbook file name:default.jbs
                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                            Number of analysed new started processes analysed:5
                                                            Number of new started drivers analysed:0
                                                            Number of existing processes analysed:0
                                                            Number of existing drivers analysed:0
                                                            Number of injected processes analysed:0
                                                            Technologies:
                                                            • HCA enabled
                                                            • EGA enabled
                                                            • AMSI enabled
                                                            Analysis Mode:default
                                                            Analysis stop reason:Timeout
                                                            Sample name:Update.js
                                                            Detection:MAL
                                                            Classification:mal68.evad.winJS@1/0@1/1
                                                            EGA Information:Failed
                                                            HCA Information:
                                                            • Successful, ratio: 100%
                                                            • Number of executed functions: 0
                                                            • Number of non-executed functions: 0
                                                            Cookbook Comments:
                                                            • Found application associated with file extension: .js
                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                            • Not all processes where analyzed, report is missing behavior information
                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                            • VT rate limit hit for: Update.js
                                                            No simulations
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            79.141.163.131update.jsGet hashmaliciousNetSupport RATBrowse
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              roadrunnersell.comupdate.jsGet hashmaliciousNetSupport RATBrowse
                                                              • 79.141.163.131
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              HZ-US-ASBGupdate.jsGet hashmaliciousNetSupport RATBrowse
                                                              • 79.141.163.131
                                                              https://premium.davidabostic.comGet hashmaliciousUnknownBrowse
                                                              • 185.33.84.157
                                                              https://chefspavilion.com/cdn-vs/original.jsGet hashmaliciousUnknownBrowse
                                                              • 185.33.85.42
                                                              https://chefspavilion.com/cdn-vs/original.jsGet hashmaliciousUnknownBrowse
                                                              • 185.33.85.42
                                                              http://www.wbdg.orgGet hashmaliciousUnknownBrowse
                                                              • 185.33.85.42
                                                              http://www.wbdg.orgGet hashmaliciousUnknownBrowse
                                                              • 185.33.85.42
                                                              https://premium.davidabostic.com/Get hashmaliciousUnknownBrowse
                                                              • 185.33.84.157
                                                              Update.jsGet hashmaliciousNetSupport RATBrowse
                                                              • 79.141.161.172
                                                              http://premium.davidabostic.comGet hashmaliciousUnknownBrowse
                                                              • 185.33.84.157
                                                              http://premium.davidabostic.comGet hashmaliciousUnknownBrowse
                                                              • 185.33.84.157
                                                              No context
                                                              No context
                                                              No created / dropped files found
                                                              File type:ASCII text, with very long lines (463)
                                                              Entropy (8bit):5.273757495184253
                                                              TrID:
                                                                File name:Update.js
                                                                File size:6'980'191 bytes
                                                                MD5:25f77d065e86649afff03a1ac4791f52
                                                                SHA1:6cbf2d9fe70da875f726eaaf39a5e6f593df85c2
                                                                SHA256:0c39052a52eda424ffef8dc4e230e17a142b1e6239ada891fb3a0946a501e4ae
                                                                SHA512:649116ba43481f0c3a350a36624f624329ae0d94e943eecfd3848b71151161a0cc527ed17c83b15feb4b40e5b79a9eee08a4774c57ab91280003d1db6a4cae25
                                                                SSDEEP:49152:OCz4F9dM2furCz4F9dM2fuVCz4F9dM2furCz4F9dM2fu+Cz4F9dM2furCz4F9dMf:OkGgkGMkGgkGRkGgkGcR
                                                                TLSH:3F66E64876EE584D915332289A7FE844F23CC127E14AD9E5B8ACE8F01FE4024577AE7D
                                                                File Content Preview:(function() {. function r(e, n, t) {. function o(i, f) {. if (!n[i]) {. if (!e[i]) {. var c = "function" == typeof require && require;. if (!f && c) return c(i, !0);.
                                                                Icon Hash:68d69b8bb6aa9a86
                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                2024-09-27T16:09:09.802854+02002056179ET EXPLOIT_KIT ZPHP Domain in DNS Lookup (roadrunnersell .com)1192.168.2.4580511.1.1.153UDP
                                                                2024-09-27T16:09:52.573726+02002056180ET EXPLOIT_KIT ZPHP Domain in TLS SNI (roadrunnersell .com)1192.168.2.44973079.141.163.131443TCP
                                                                2024-09-27T16:10:35.389939+02002056180ET EXPLOIT_KIT ZPHP Domain in TLS SNI (roadrunnersell .com)1192.168.2.44973779.141.163.131443TCP
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Sep 27, 2024 16:09:09.817687035 CEST49730443192.168.2.479.141.163.131
                                                                Sep 27, 2024 16:09:09.817727089 CEST4434973079.141.163.131192.168.2.4
                                                                Sep 27, 2024 16:09:09.817925930 CEST49730443192.168.2.479.141.163.131
                                                                Sep 27, 2024 16:09:09.828636885 CEST49730443192.168.2.479.141.163.131
                                                                Sep 27, 2024 16:09:09.828646898 CEST4434973079.141.163.131192.168.2.4
                                                                Sep 27, 2024 16:09:52.573662996 CEST4434973079.141.163.131192.168.2.4
                                                                Sep 27, 2024 16:09:52.573725939 CEST49730443192.168.2.479.141.163.131
                                                                Sep 27, 2024 16:09:52.617194891 CEST49730443192.168.2.479.141.163.131
                                                                Sep 27, 2024 16:09:52.617218018 CEST4434973079.141.163.131192.168.2.4
                                                                Sep 27, 2024 16:09:52.618458986 CEST49737443192.168.2.479.141.163.131
                                                                Sep 27, 2024 16:09:52.618510962 CEST4434973779.141.163.131192.168.2.4
                                                                Sep 27, 2024 16:09:52.618571043 CEST49737443192.168.2.479.141.163.131
                                                                Sep 27, 2024 16:09:52.619581938 CEST49737443192.168.2.479.141.163.131
                                                                Sep 27, 2024 16:09:52.619601011 CEST4434973779.141.163.131192.168.2.4
                                                                Sep 27, 2024 16:10:35.388358116 CEST4434973779.141.163.131192.168.2.4
                                                                Sep 27, 2024 16:10:35.389939070 CEST49737443192.168.2.479.141.163.131
                                                                Sep 27, 2024 16:10:35.390024900 CEST49737443192.168.2.479.141.163.131
                                                                Sep 27, 2024 16:10:35.390084982 CEST4434973779.141.163.131192.168.2.4
                                                                Sep 27, 2024 16:10:35.390675068 CEST49739443192.168.2.479.141.163.131
                                                                Sep 27, 2024 16:10:35.390727043 CEST4434973979.141.163.131192.168.2.4
                                                                Sep 27, 2024 16:10:35.393786907 CEST49739443192.168.2.479.141.163.131
                                                                Sep 27, 2024 16:10:35.393910885 CEST49739443192.168.2.479.141.163.131
                                                                Sep 27, 2024 16:10:35.393949986 CEST4434973979.141.163.131192.168.2.4
                                                                Sep 27, 2024 16:10:35.396109104 CEST49739443192.168.2.479.141.163.131
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Sep 27, 2024 16:09:09.802854061 CEST5805153192.168.2.41.1.1.1
                                                                Sep 27, 2024 16:09:09.812199116 CEST53580511.1.1.1192.168.2.4
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Sep 27, 2024 16:09:09.802854061 CEST192.168.2.41.1.1.10xd616Standard query (0)roadrunnersell.comA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Sep 27, 2024 16:09:09.812199116 CEST1.1.1.1192.168.2.40xd616No error (0)roadrunnersell.com79.141.163.131A (IP address)IN (0x0001)false

                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Target ID:0
                                                                Start time:10:09:06
                                                                Start date:27/09/2024
                                                                Path:C:\Windows\System32\wscript.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Update.js"
                                                                Imagebase:0x7ff7d4ef0000
                                                                File size:170'496 bytes
                                                                MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                No disassembly