Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
892016_Past Invoice_03_26_2024_48118858_756483.wsf

Overview

General Information

Sample name:892016_Past Invoice_03_26_2024_48118858_756483.wsf
Analysis ID:1417141
MD5:21af268b10f8a21508a905969fcefd80
SHA1:01e5fd088388cda15b589877ad5f9d62bab34549
SHA256:0e3fa4ee6777c4a48c775ef21b77dbc20f30beda06478fbfdc3d0f8fad0d9e07
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
System process connects to network (likely due to code injection or exploit)
Installs new ROOT certificates
Sample has a suspicious name (potential lure to open the executable)
Sigma detected: Script Initiated Connection to Non-Local Network
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Found WSH timer for Javascript or VBS script (likely evasive script)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Sigma detected: Script Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores large binary data to the registry
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w7x64
  • wscript.exe (PID: 3176 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\892016_Past Invoice_03_26_2024_48118858_756483.wsf" MD5: 045451FA238A75305CC26AC982472367)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 104.21.48.77, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 3176, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49161
Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 104.21.48.77, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 3176, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49161
Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\892016_Past Invoice_03_26_2024_48118858_756483.wsf", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\892016_Past Invoice_03_26_2024_48118858_756483.wsf", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1244, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\892016_Past Invoice_03_26_2024_48118858_756483.wsf", ProcessId: 3176, ProcessName: wscript.exe
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://apllicam.com/operational-resoufrcesAvira URL Cloud: Label: malware
Source: https://apllicam.com/operational-resoufrces.)SettingsAvira URL Cloud: Label: malware
Source: apllicam.comVirustotal: Detection: 10%Perma Link
Source: unknownHTTPS traffic detected: 104.21.48.77:443 -> 192.168.2.22:49161 version: TLS 1.0

Networking

barindex
Source: C:\Windows\System32\wscript.exeNetwork Connect: 104.21.48.77 443Jump to behavior
Source: C:\Windows\System32\wscript.exeDomain query: apllicam.com
Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
Source: global trafficHTTP traffic detected: GET /operational-resoufrces HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: apllicam.com
Source: unknownHTTPS traffic detected: 104.21.48.77:443 -> 192.168.2.22:49161 version: TLS 1.0
Source: global trafficHTTP traffic detected: GET /operational-resoufrces HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: apllicam.com
Source: wscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
Source: unknownDNS traffic detected: queries for: apllicam.com
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 28 Mar 2024 16:00:45 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HSJzhonlX5e3FPMc4oqUc%2Fl5mi9Gq1nR2rEmqwjOvbJLqpw4uVTI4aVgYPrdFLtLGIkEBYIym8XgB165e0CsQWygyXjg6ZYoQfuTrf96OfHKeQJiHD2HUQtzD49LSQA%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 86b8d5bdcf12083e-IADalt-svc: h3=":443"; ma=86400
Source: wscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: wscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
Source: wscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
Source: wscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
Source: wscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: wscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
Source: wscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
Source: wscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
Source: wscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
Source: wscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
Source: wscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
Source: wscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
Source: wscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
Source: wscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
Source: wscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
Source: wscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
Source: wscript.exe, 00000000.00000003.339652121.0000000003DA3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.339610229.0000000003D9F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DAD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.339778135.0000000003DAB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apllicam.com/operational-resoufrces
Source: wscript.exe, 00000000.00000003.339765030.00000000002B9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339865650.00000000002BC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apllicam.com/operational-resoufrces.)Settings
Source: wscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
Source: unknownNetwork traffic detected: HTTP traffic on port 49161 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49161

System Summary

barindex
Source: 892016_Past Invoice_03_26_2024_48118858_756483.wsfStatic file information: Suspicious name
Source: C:\Windows\System32\wscript.exeCOM Object queried: WinHttpRequest Component version 5.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{2087C2F4-2CEF-4953-A8AB-66779B670495}\ProgIDJump to behavior
Source: 892016_Past Invoice_03_26_2024_48118858_756483.wsfInitial sample: Strings found which are bigger than 50
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rpcrtremote.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: credssp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: bcrypt.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: gpapi.dllJump to behavior
Source: classification engineClassification label: mal80.evad.winWSF@1/0@2/1
Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{06290BD0-48AA-11D2-8432-006008C3FBFC}\InprocServer32Jump to behavior

Persistence and Installation Behavior

barindex
Source: C:\Windows\System32\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Windows\System32\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
Source: C:\Windows\System32\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Windows\System32\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Windows\System32\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Windows\System32\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Windows\System32\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
Source: C:\Windows\System32\wscript.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: C:\Windows\System32\wscript.exe TID: 3220Thread sleep time: -60000s >= -30000sJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\wscript.exeNetwork Connect: 104.21.48.77 443Jump to behavior
Source: C:\Windows\System32\wscript.exeDomain query: apllicam.com
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information2
Scripting
Valid AccountsWindows Management Instrumentation2
Scripting
1
Process Injection
1
Install Root Certificate
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Modify Registry
LSASS Memory2
System Information Discovery
Remote Desktop ProtocolData from Removable Media3
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Virtualization/Sandbox Evasion
Security Account Manager1
Remote System Discovery
SMB/Windows Admin SharesData from Network Shared Drive14
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture3
Ingress Tool Transfer
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
SourceDetectionScannerLabelLink
892016_Past Invoice_03_26_2024_48118858_756483.wsf0%ReversingLabs
892016_Past Invoice_03_26_2024_48118858_756483.wsf5%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
apllicam.com11%VirustotalBrowse
SourceDetectionScannerLabelLink
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
http://ocsp.entrust.net0D0%URL Reputationsafe
http://ocsp.entrust.net030%URL Reputationsafe
https://apllicam.com/operational-resoufrces100%Avira URL Cloudmalware
https://apllicam.com/operational-resoufrces.)Settings100%Avira URL Cloudmalware
https://apllicam.com/operational-resoufrces0%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
apllicam.com
104.21.48.77
truetrueunknown
NameMaliciousAntivirus DetectionReputation
https://apllicam.com/operational-resoufrcestrue
  • 0%, Virustotal, Browse
  • Avira URL Cloud: malware
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0wscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0wscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://www.diginotar.nl/cps/pkioverheid0wscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://crl.entrust.net/server1.crl0wscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpfalse
    high
    http://ocsp.entrust.net0Dwscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://ocsp.entrust.net03wscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://secure.comodo.com/CPS0wscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpfalse
      high
      http://crl.entrust.net/2048ca.crl0wscript.exe, 00000000.00000003.339610229.0000000003DC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339999872.0000000003DC3000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        https://apllicam.com/operational-resoufrces.)Settingswscript.exe, 00000000.00000003.339765030.00000000002B9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.339865650.00000000002BC000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        104.21.48.77
        apllicam.comUnited States
        13335CLOUDFLARENETUStrue
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1417141
        Start date and time:2024-03-28 16:59:59 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 1m 49s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
        Number of analysed new started processes analysed:2
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:892016_Past Invoice_03_26_2024_48118858_756483.wsf
        Detection:MAL
        Classification:mal80.evad.winWSF@1/0@2/1
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .wsf
        • Stop behavior analysis, all processes terminated
        • Exclude process from analysis (whitelisted): dllhost.exe
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        TimeTypeDescription
        17:00:43API Interceptor15x Sleep call for process: wscript.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        104.21.48.77dar.exeGet hashmaliciousLokibotBrowse
        • locandasolagna.xyz/dar/panel/five/fre.php
        Purchase Order (DUBA-CVL-136-05-21).exeGet hashmaliciousLokibotBrowse
        • locandasolagna.xyz/dar/panel/five/fre.php
        dar.exeGet hashmaliciousLokibotBrowse
        • locandasolagna.xyz/dar/panel/five/fre.php
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        apllicam.com798942_Invoice_03_26_2024_56388516_947935.wsfGet hashmaliciousUnknownBrowse
        • 104.21.48.77
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        CLOUDFLARENETUShttps://www.rewardgateway.com/Get hashmaliciousHTMLPhisherBrowse
        • 104.18.192.125
        Sldl84wxy8.exeGet hashmaliciousAsyncRAT, VenomRATBrowse
        • 104.21.95.148
        https://content.amac.us/?m=ff1Z8iQrULAL24m6HV3KXgLVd6tjSdDrf&r=https://www.lcrhtrk.com/LSK646/3M7TGPW/?sub1=4956Get hashmaliciousUnknownBrowse
        • 172.64.144.175
        http://www.rewardgateway.comGet hashmaliciousHTMLPhisherBrowse
        • 104.18.79.253
        https://www.rewardgateway.com/Get hashmaliciousHTMLPhisherBrowse
        • 104.18.79.253
        securedoc_20240328T081124.htmlGet hashmaliciousUnknownBrowse
        • 104.18.11.207
        https://airispharma1-my.sharepoint.com/:o:/g/personal/anagaraj_airispharma_com/EvmEpKGsyxtGnlrgsjVRxi4BOj2g3uhzHgNY6tXqx6wp5g?e=JtdJfIGet hashmaliciousHTMLPhisherBrowse
        • 104.17.25.14
        https://credit-bittrex.com/creditorGet hashmaliciousPhisherBrowse
        • 172.67.213.53
        rU6YAgkoAw.exeGet hashmaliciousAsyncRATBrowse
        • 104.21.95.148
        Quarantined Messages (12).zipGet hashmaliciousUnknownBrowse
        • 1.1.1.1
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        05af1f5ca1b87cc9cc9b25185115607dIncident_Report_Harassment_by_Employee.docGet hashmaliciousUnknownBrowse
        • 104.21.48.77
        06836722_218 Aluplast.docx.docGet hashmaliciousUnknownBrowse
        • 104.21.48.77
        Reserva Detalhes.ppamGet hashmaliciousUnknownBrowse
        • 104.21.48.77
        Chrome.vbsGet hashmaliciousUnknownBrowse
        • 104.21.48.77
        aaaaaa.docx.docGet hashmaliciousUnknownBrowse
        • 104.21.48.77
        Detalhes Reserva.ppamGet hashmaliciousUnknownBrowse
        • 104.21.48.77
        Payment_Draft_confirmation.xla.xlsxGet hashmaliciousSnake KeyloggerBrowse
        • 104.21.48.77
        pedido de compra 4500628950##.xla.xlsxGet hashmaliciousAgentTeslaBrowse
        • 104.21.48.77
        CA-OP2402406.xla.xlsxGet hashmaliciousAgentTeslaBrowse
        • 104.21.48.77
        C7XvDzw2Wh.rtfGet hashmaliciousAgentTeslaBrowse
        • 104.21.48.77
        No context
        No created / dropped files found
        File type:HTML document, ASCII text, with very long lines (23648)
        Entropy (8bit):5.52571466165652
        TrID:
        • Artificial Intelligence Markup Language (14501/1) 100.00%
        File name:892016_Past Invoice_03_26_2024_48118858_756483.wsf
        File size:295'438 bytes
        MD5:21af268b10f8a21508a905969fcefd80
        SHA1:01e5fd088388cda15b589877ad5f9d62bab34549
        SHA256:0e3fa4ee6777c4a48c775ef21b77dbc20f30beda06478fbfdc3d0f8fad0d9e07
        SHA512:29bea66d85951f04fe1982ed5e5d1b13f4c75409b03ff00f8780798207a9633a0726d89214dddb0b319b257854b8953ea93ba9a7ee314678c142e05f642c5875
        SSDEEP:6144:evZiwD8ETPM+8RpLFOHw2toifU9yfx4PQQqFrK7Hyn1t9kqdnkf:cRD8r2fx4AK7S1t9NSf
        TLSH:1D546C1B7365333A4B530192E94E47E9AF3CCC2673615960649C41A8272AC3DE3BB7ED
        File Content Preview:<job><script UXcHpKLEDQELOoXSeQCi="se 47 may be negative, but cannot be zero. Arbeitsablufe dafr bildet MPI_FILE_READ_ORDERED_END(FH, BUF, STATUS, IERROR) 13 renewal application is not funded, the Interim report becomes the Final report. Final reports ar
        Icon Hash:68d69b8f86ab9a86
        TimestampSource PortDest PortSource IPDest IP
        Mar 28, 2024 17:00:45.339756012 CET49161443192.168.2.22104.21.48.77
        Mar 28, 2024 17:00:45.339792013 CET44349161104.21.48.77192.168.2.22
        Mar 28, 2024 17:00:45.339850903 CET49161443192.168.2.22104.21.48.77
        Mar 28, 2024 17:00:45.341798067 CET49161443192.168.2.22104.21.48.77
        Mar 28, 2024 17:00:45.341811895 CET44349161104.21.48.77192.168.2.22
        Mar 28, 2024 17:00:45.549993992 CET44349161104.21.48.77192.168.2.22
        Mar 28, 2024 17:00:45.550081968 CET49161443192.168.2.22104.21.48.77
        Mar 28, 2024 17:00:45.553775072 CET49161443192.168.2.22104.21.48.77
        Mar 28, 2024 17:00:45.553781033 CET44349161104.21.48.77192.168.2.22
        Mar 28, 2024 17:00:45.554084063 CET44349161104.21.48.77192.168.2.22
        Mar 28, 2024 17:00:45.657233000 CET49161443192.168.2.22104.21.48.77
        Mar 28, 2024 17:00:45.700246096 CET44349161104.21.48.77192.168.2.22
        Mar 28, 2024 17:00:46.031610012 CET44349161104.21.48.77192.168.2.22
        Mar 28, 2024 17:00:46.031718016 CET44349161104.21.48.77192.168.2.22
        Mar 28, 2024 17:00:46.031774044 CET49161443192.168.2.22104.21.48.77
        Mar 28, 2024 17:00:46.122318029 CET49161443192.168.2.22104.21.48.77
        Mar 28, 2024 17:00:46.122349977 CET44349161104.21.48.77192.168.2.22
        Mar 28, 2024 17:00:46.122365952 CET49161443192.168.2.22104.21.48.77
        Mar 28, 2024 17:00:46.122371912 CET44349161104.21.48.77192.168.2.22
        TimestampSource PortDest PortSource IPDest IP
        Mar 28, 2024 17:00:45.066138983 CET5456253192.168.2.228.8.8.8
        Mar 28, 2024 17:00:45.218750000 CET53545628.8.8.8192.168.2.22
        Mar 28, 2024 17:00:45.223946095 CET5291753192.168.2.228.8.8.8
        Mar 28, 2024 17:00:45.338114023 CET53529178.8.8.8192.168.2.22
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Mar 28, 2024 17:00:45.066138983 CET192.168.2.228.8.8.80xea84Standard query (0)apllicam.comA (IP address)IN (0x0001)false
        Mar 28, 2024 17:00:45.223946095 CET192.168.2.228.8.8.80x4d7Standard query (0)apllicam.comA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Mar 28, 2024 17:00:45.218750000 CET8.8.8.8192.168.2.220xea84No error (0)apllicam.com104.21.48.77A (IP address)IN (0x0001)false
        Mar 28, 2024 17:00:45.218750000 CET8.8.8.8192.168.2.220xea84No error (0)apllicam.com172.67.181.187A (IP address)IN (0x0001)false
        Mar 28, 2024 17:00:45.338114023 CET8.8.8.8192.168.2.220x4d7No error (0)apllicam.com172.67.181.187A (IP address)IN (0x0001)false
        Mar 28, 2024 17:00:45.338114023 CET8.8.8.8192.168.2.220x4d7No error (0)apllicam.com104.21.48.77A (IP address)IN (0x0001)false
        • apllicam.com
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.2249161104.21.48.774433176C:\Windows\System32\wscript.exe
        TimestampBytes transferredDirectionData
        2024-03-28 16:00:45 UTC168OUTGET /operational-resoufrces HTTP/1.1
        Connection: Keep-Alive
        Accept: */*
        User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
        Host: apllicam.com
        2024-03-28 16:00:46 UTC578INHTTP/1.1 404 Not Found
        Date: Thu, 28 Mar 2024 16:00:45 GMT
        Content-Type: text/html; charset=iso-8859-1
        Transfer-Encoding: chunked
        Connection: close
        CF-Cache-Status: DYNAMIC
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HSJzhonlX5e3FPMc4oqUc%2Fl5mi9Gq1nR2rEmqwjOvbJLqpw4uVTI4aVgYPrdFLtLGIkEBYIym8XgB165e0CsQWygyXjg6ZYoQfuTrf96OfHKeQJiHD2HUQtzD49LSQA%3D"}],"group":"cf-nel","max_age":604800}
        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
        Server: cloudflare
        CF-RAY: 86b8d5bdcf12083e-IAD
        alt-svc: h3=":443"; ma=86400
        2024-03-28 16:00:46 UTC226INData Raw: 64 63 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 6f 70 65 72 61 74 69 6f 6e 61 6c 2d 72 65 73 6f 75 66 72 63 65 73 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a 0d 0a
        Data Ascii: dc<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /operational-resoufrces was not found on this server.</p></body></html>
        2024-03-28 16:00:46 UTC5INData Raw: 30 0d 0a 0d 0a
        Data Ascii: 0


        Click to jump to process

        Click to jump to process

        Target ID:0
        Start time:17:00:43
        Start date:28/03/2024
        Path:C:\Windows\System32\wscript.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\892016_Past Invoice_03_26_2024_48118858_756483.wsf"
        Imagebase:0xfff00000
        File size:168'960 bytes
        MD5 hash:045451FA238A75305CC26AC982472367
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        No disassembly