IOC Report
Invoice_949287 2024_4_81859153_8337611.js

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Invoice_949287 2024_4_81859153_8337611.js"
malicious

URLs

Name
IP
Malicious
https://pankerfan.com/2u
unknown
https://www.ppsloan.org/publications/StupidSH36.pdf
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=583181
unknown
https://pankerfan.com/eft-edi-customer?Xe=wawxGFZa&Ys=ecIFw&sourceNB=qdE
unknown
https://trac.torproject.org/projects/tor/ticket/26114
unknown
https://pankerfan.com/eft-edi-customer?Xe=wawxGFZa&Ys=ecIFw&sourceNB=qdENHf&jjcontent=mIBXU&l_cid=82
unknown
https://wiki.mozilla.org/Security/Tor_Uplift/Tracking
unknown
https://pankerfan.com/
unknown
https://pankerfan.com/:u
unknown
https://pankerfan.com:443/eft-edi-customer?Xe=wawxGFZa&Ys=ecIFw&sourceNB=qdENHf&jjcontent=mIBXU&l_ci
unknown
https://github.com/pmjoniak/GeometricTools/blob/master/GTEngine/Include/Mathematics/GteIntrRay3Trian
unknown
https://media.blackhat.com/us-13/US-13-Daigniere-TLS-Secrets-Slides.pdf
unknown
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
pankerfan.com
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
200A8544000
heap
page read and write
200A850C000
heap
page read and write
200A66EA000
heap
page read and write
200A850C000
heap
page read and write
1004FD000
stack
page read and write
200A65C0000
heap
page read and write
200A66CB000
heap
page read and write
200A66EA000
heap
page read and write
200A84DB000
heap
page read and write
200A84C6000
heap
page read and write
200A6709000
heap
page read and write
200A8508000
heap
page read and write
200A84E7000
heap
page read and write
200A66FC000
heap
page read and write
200A8544000
heap
page read and write
200A66F2000
heap
page read and write
200A84C3000
heap
page read and write
200A66CF000
heap
page read and write
200A66F0000
heap
page read and write
200A8545000
heap
page read and write
1001FE000
stack
page read and write
100CFF000
stack
page read and write
200A8508000
heap
page read and write
200A66FC000
heap
page read and write
200A84E7000
heap
page read and write
200A8541000
heap
page read and write
200A68EC000
heap
page read and write
200A66F0000
heap
page read and write
200A6687000
heap
page read and write
200A8508000
heap
page read and write
200A66CB000
heap
page read and write
200A66AA000
heap
page read and write
200A6668000
heap
page read and write
200A8510000
heap
page read and write
200A68EC000
heap
page read and write
200A8508000
heap
page read and write
1008FF000
stack
page read and write
100BFC000
stack
page read and write
200A66CB000
heap
page read and write
200A6660000
heap
page read and write
200A6688000
heap
page read and write
200A67D0000
remote allocation
page read and write
200A9541000
heap
page read and write
200A66AB000
heap
page read and write
200A8544000
heap
page read and write
200A84DE000
heap
page read and write
200A84C0000
heap
page read and write
200A84E3000
heap
page read and write
1000FA000
stack
page read and write
200A66CF000
heap
page read and write
200A66FC000
heap
page read and write
200AAA3D000
heap
page read and write
200A68ED000
heap
page read and write
200A9AD2000
heap
page read and write
200AA03D000
heap
page read and write
200A64E0000
heap
page read and write
200A66C3000
heap
page read and write
200A66F8000
heap
page read and write
200A67D0000
remote allocation
page read and write
200A66C3000
heap
page read and write
200AA5C8000
heap
page read and write
200A6709000
heap
page read and write
200AA4D2000
heap
page read and write
200A66EA000
heap
page read and write
200A8508000
heap
page read and write
200A8544000
heap
page read and write
200A6709000
heap
page read and write
200AAFC8000
heap
page read and write
200A68ED000
heap
page read and write
200A66CF000
heap
page read and write
200A68E9000
heap
page read and write
200A68E9000
heap
page read and write
200A66F0000
heap
page read and write
200A68EC000
heap
page read and write
200A66FC000
heap
page read and write
200A67D0000
remote allocation
page read and write
200AB0B4000
heap
page read and write
200A66FC000
heap
page read and write
200A68EB000
heap
page read and write
200A84CB000
heap
page read and write
200A8508000
heap
page read and write
1007FF000
stack
page read and write
200A84C1000
heap
page read and write
200A84DE000
heap
page read and write
200A8A43000
heap
page read and write
200A6709000
heap
page read and write
200A667C000
heap
page read and write
200A66F7000
heap
page read and write
200A6709000
heap
page read and write
200A6681000
heap
page read and write
200A9443000
heap
page read and write
100AFB000
stack
page read and write
200A850E000
heap
page read and write
200A850C000
heap
page read and write
200A65E0000
heap
page read and write
200A67F0000
heap
page read and write
200A68E0000
heap
page read and write
200A9F41000
heap
page read and write
1006FE000
stack
page read and write
1009FF000
stack
page read and write
200ABAB4000
heap
page read and write
200A66F3000
heap
page read and write
200A954D000
heap
page read and write
200A68E5000
heap
page read and write
200A850C000
heap
page read and write
There are 95 hidden memdumps, click here to show them.