Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
license.js

Overview

General Information

Sample name:license.js
Analysis ID:1665818
MD5:d6c142afbb5a25e452e0f902d3b43a3b
SHA1:e310a551f718339f79d8b0a74119358d2f6ef51e
SHA256:5230c4ebf4f03787e6f4b78233ea6a1ccd5bdede1fbd23ba7e21339c01b0d0e7
Tags:jsvjw0rmuser-smica83
Infos:

Detection

VjW0rm
Score:100
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
JScript performs obfuscated calls to suspicious functions
Sigma detected: Drops script at startup location
Yara detected VjW0rm
C2 URLs / IPs found in malware configuration
Drops script or batch files to the startup folder
Joe Sandbox ML detected suspicious sample
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Sigma detected: WScript or CScript Dropper - File
Windows Scripting host queries suspicious COM object (likely to drop second stage)
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Found WSH timer for Javascript or VBS script (likely evasive script)
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Script Initiated Connection
Sigma detected: Startup Folder File Write
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • wscript.exe (PID: 7860 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\license.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • cscript.exe (PID: 8080 cmdline: "C:\Windows\SysWOW64\cscript.exe" /e:jscript "C:\Users\user\Desktop\license.js" MD5: CB601B41D4C8074BE8A84AED564A94DC)
      • conhost.exe (PID: 8088 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • wscript.exe (PID: 7644 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\license.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • cscript.exe (PID: 8100 cmdline: "C:\Windows\SysWOW64\cscript.exe" /e:jscript "C:\Users\user\AppData\Local\Temp\license.js" MD5: CB601B41D4C8074BE8A84AED564A94DC)
      • conhost.exe (PID: 8092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Vjw0rmVJW0rm (aka Vengeance Justice Worm) is a publicly available, modular JavaScript RAT. Vjw0rm was first released in November 2016 by its primary author, v_B01 (aka Sliemerez), within the prominent DevPoint Arabic-language malware development community. VJW0rm appears to be the JavaScript variant of a series of RATs with identical functionality released by the author throughout late 2016. Other variants include a Visual Basic Script (VBS) based worm titled vw0rm (Vengeance Worm), an AutoHotkey-based tool called vrw0rm (Vengeance Rise Worm), and a PowerShell-based variant called vdw0rm (Vengeance Depth Worm).No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.vjw0rm
{"C2 url": "http://sbhfth.mywire.org:79/Vre"}
SourceRuleDescriptionAuthorStrings
Process Memory Space: cscript.exe PID: 8080JoeSecurity_VjW0rmYara detected VjW0rmJoe Security
    Process Memory Space: cscript.exe PID: 8100JoeSecurity_VjW0rmYara detected VjW0rmJoe Security
      SourceRuleDescriptionAuthorStrings
      amsi32_8080.amsi.csvJoeSecurity_VjW0rmYara detected VjW0rmJoe Security
        amsi32_8100.amsi.csvJoeSecurity_VjW0rmYara detected VjW0rmJoe Security

          System Summary

          barindex
          Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: "C:\Users\user\AppData\Local\Temp\license.js", EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\cscript.exe, ProcessId: 8080, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\11840STYL3
          Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 46.196.24.72, DestinationIsIpv6: false, DestinationPort: 79, EventID: 3, Image: C:\Windows\SysWOW64\cscript.exe, Initiated: true, ProcessId: 8080, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49717
          Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\license.js" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\license.js" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3964, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\license.js" , ProcessId: 7644, ProcessName: wscript.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\license.js" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\license.js" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3964, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\license.js" , ProcessId: 7644, ProcessName: wscript.exe
          Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\license.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\license.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3964, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\license.js", ProcessId: 7860, ProcessName: wscript.exe
          Source: File createdAuthor: Tim Shelton: Data: EventID: 11, Image: C:\Windows\SysWOW64\cscript.exe, ProcessId: 8080, TargetFilename: C:\Users\user\AppData\Local\Temp\license.js
          Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Users\user\AppData\Local\Temp\license.js", EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\cscript.exe, ProcessId: 8080, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\11840STYL3
          Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 46.196.24.72, DestinationIsIpv6: false, DestinationPort: 79, EventID: 3, Image: C:\Windows\SysWOW64\cscript.exe, Initiated: true, ProcessId: 8080, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49717
          Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Windows\SysWOW64\cscript.exe, ProcessId: 8080, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
          Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\license.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\license.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3964, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\license.js", ProcessId: 7860, ProcessName: wscript.exe

          Data Obfuscation

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\cscript.exe, ProcessId: 8080, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\license.js
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: amsi32_8080.amsi.csvMalware Configuration Extractor: VjW0rm {"C2 url": "http://sbhfth.mywire.org:79/Vre"}
          Source: Submited SampleNeural Call Log Analysis: 95.8%
          Source: C:\Windows\SysWOW64\cscript.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeFile opened: C:\Users\userJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeFile opened: C:\Users\user\AppDataJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior

          Networking

          barindex
          Source: Malware configuration extractorURLs: http://sbhfth.mywire.org:79/Vre
          Source: global trafficTCP traffic: 192.168.2.4:49717 -> 46.196.24.72:79
          Source: Joe Sandbox ViewASN Name: TURKSAT-ASTR TURKSAT-ASTR
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: sbhfth.mywire.org
          Source: cscript.exe, 00000002.00000002.2483893657.0000000005082000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 0000000B.00000002.2484407905.00000000057D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sbhfth.mywire.org/
          Source: cscript.exe, 0000000B.00000002.2484407905.00000000057D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sbhfth.mywire.org/nes
          Source: cscript.exe, 0000000B.00000002.2482660302.000000000563F000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 0000000B.00000002.2484407905.00000000057C4000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 0000000B.00000002.2487494276.00000000066BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sbhfth.mywire.org:79/
          Source: cscript.exe, 00000002.00000002.2487726350.00000000062B4000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 00000002.00000002.2483893657.0000000005012000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 00000002.00000002.2487038170.0000000005F66000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 0000000B.00000002.2484173340.00000000056E3000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 0000000B.00000002.2487727961.0000000006A40000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 0000000B.00000002.2489402859.0000000007493000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 0000000B.00000002.2484407905.00000000057C4000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 0000000B.00000002.2487494276.00000000066BE000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 0000000B.00000002.2477266822.0000000003108000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 0000000B.00000002.2487268076.0000000006630000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 0000000B.00000002.2483626347.0000000005681000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sbhfth.mywire.org:79/Vre
          Source: cscript.exe, 0000000B.00000002.2487727961.0000000006A40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sbhfth.mywire.org:79/Vre1
          Source: cscript.exe, 00000002.00000002.2483893657.0000000005082000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sbhfth.mywire.org:79/Vre2-AD358843EC24i
          Source: cscript.exe, 0000000B.00000002.2484407905.00000000057D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sbhfth.mywire.org:79/Vre476756634-1002x
          Source: cscript.exe, 0000000B.00000002.2487727961.0000000006A40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sbhfth.mywire.org:79/VreB
          Source: cscript.exe, 0000000B.00000002.2487494276.00000000066BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sbhfth.mywire.org:79/VreC
          Source: cscript.exe, 0000000B.00000002.2487727961.0000000006A40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sbhfth.mywire.org:79/VreI
          Source: cscript.exe, 0000000B.00000002.2487494276.00000000066BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sbhfth.mywire.org:79/VreP
          Source: cscript.exe, 0000000B.00000002.2487494276.00000000066BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sbhfth.mywire.org:79/VreYn
          Source: cscript.exe, 0000000B.00000002.2487727961.0000000006A40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sbhfth.mywire.org:79/Vref
          Source: cscript.exe, 00000002.00000002.2487038170.0000000005F66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sbhfth.mywire.org:79/Vrey$
          Source: cscript.exe, 00000002.00000002.2487726350.00000000062B4000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 0000000B.00000002.2487727961.0000000006A40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com

          System Summary

          barindex
          Source: C:\Windows\System32\wscript.exeCOM Object queried: MSScriptControl.ScriptControl HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0E59F1D5-1FBE-11D0-8FF2-00A0D10038BC}Jump to behavior
          Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
          Source: license.jsInitial sample: Strings found which are bigger than 50
          Source: classification engineClassification label: mal100.troj.expl.evad.winJS@8/4@1/1
          Source: C:\Windows\SysWOW64\cscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\license.jsJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8088:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8092:120:WilError_03
          Source: C:\Windows\SysWOW64\cscript.exeFile created: C:\Users\user\AppData\Local\Temp\license.jsJump to behavior
          Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\license.js"
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\cscript.exe "C:\Windows\SysWOW64\cscript.exe" /e:jscript "C:\Users\user\Desktop\license.js"
          Source: C:\Windows\SysWOW64\cscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\license.js"
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\cscript.exe "C:\Windows\SysWOW64\cscript.exe" /e:jscript "C:\Users\user\AppData\Local\Temp\license.js"
          Source: C:\Windows\SysWOW64\cscript.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\cscript.exe "C:\Windows\SysWOW64\cscript.exe" /e:jscript "C:\Users\user\Desktop\license.js"Jump to behavior
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\cscript.exe "C:\Windows\SysWOW64\cscript.exe" /e:jscript "C:\Users\user\AppData\Local\Temp\license.js"Jump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: sxs.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: jscript.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: scrobj.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: mlang.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: vbscript.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: scrrun.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: msxml3.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: napinsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: pnrpnsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: wshbth.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: nlaapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: winrnr.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: napinsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: pnrpnsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: wshbth.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: nlaapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: winrnr.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: napinsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: pnrpnsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: wshbth.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: nlaapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: winrnr.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: sxs.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: jscript.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: scrobj.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: mlang.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: vbscript.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: scrrun.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: msxml3.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: napinsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: pnrpnsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: wshbth.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: nlaapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: winrnr.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: napinsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: pnrpnsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: wshbth.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: nlaapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: winrnr.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: napinsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: pnrpnsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: wshbth.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: nlaapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeSection loaded: winrnr.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior

          Data Obfuscation

          barindex
          Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.ScriptFullName, "\""); var shell = WScript.CreateObject("WScript.Shell"); shell.Run(cmd, 0, false); WScript.Quit(0);}sc.Language = "VBScript";sc.Timeout = -1;sc.AllowUI = true;sc.AddObject("wscript", WScript, true);sc.AddCode(code);IHost.ScriptFullName();IHost.CreateObject("WScript.Shell");IWshShell3.Run(""%SystemRoot%\SysWOW64\cscript.exe" /e:jscript "C:\Users\user\Desktop\lic", "0", "false")
          Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.ScriptFullName, "\""); var shell = WScript.CreateObject("WScript.Shell"); shell.Run(cmd, 0, false); WScript.Quit(0);}sc.Language = "VBScript";sc.Timeout = -1;sc.AllowUI = true;sc.AddObject("wscript", WScript, true);sc.AddCode(code);IHost.ScriptFullName();IHost.CreateObject("WScript.Shell");IWshShell3.Run(""%SystemRoot%\SysWOW64\cscript.exe" /e:jscript "C:\Users\user\AppData\Loc", "0", "false")
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 2_2_0562EB6A push esp; retf 2_2_0562EB85
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 2_2_0562EC4C push eax; retf 2_2_0562EC4D
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 2_2_0562EB50 push esp; retf 2_2_0562EB51
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 2_2_0562E5B5 push esp; retf 2_2_0562EB1D
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 11_2_07E0FACC pushad ; retf 11_2_07E0FBA1
          Source: C:\Windows\SysWOW64\cscript.exeCode function: 11_2_07E0FB35 pushad ; retf 11_2_07E0FBA1

          Boot Survival

          barindex
          Source: C:\Windows\SysWOW64\cscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\license.jsJump to dropped file
          Source: C:\Windows\SysWOW64\cscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\license.jsJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\license.jsJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\license.js\:Zone.Identifier:$DATAJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\license.js\:Zone.Identifier:$DATAJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 11840STYL3Jump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 11840STYL3Jump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : win32_logicaldisk
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : win32_logicaldisk
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : win32_logicaldisk
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : win32_logicaldisk
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : win32_logicaldisk
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : win32_logicaldisk
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : win32_logicaldisk
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : win32_logicaldisk
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : win32_logicaldisk
          Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
          Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\cscript.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeFile opened: C:\Users\userJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeFile opened: C:\Users\user\AppDataJump to behavior
          Source: C:\Windows\SysWOW64\cscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
          Source: wscript.exe, 00000000.00000003.1230126354.000002129073C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}8b}
          Source: cscript.exe, 00000002.00000002.2487726350.00000000062A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0m*
          Source: cscript.exe, 00000002.00000002.2487726350.00000000062C9000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 00000002.00000002.2487726350.00000000062A0000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 0000000B.00000002.2487727961.0000000006A5B000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 0000000B.00000002.2487727961.0000000006A30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\cscript.exe "C:\Windows\SysWOW64\cscript.exe" /e:jscript "C:\Users\user\Desktop\license.js"Jump to behavior
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\cscript.exe "C:\Windows\SysWOW64\cscript.exe" /e:jscript "C:\Users\user\AppData\Local\Temp\license.js"Jump to behavior
          Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          Source: cscript.exe, 00000002.00000002.2486908588.0000000005EA0000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 00000002.00000002.2477471425.0000000002B28000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 00000002.00000002.2487726350.00000000062A0000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 0000000B.00000002.2487727961.0000000006A5B000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 0000000B.00000002.2487494276.00000000066BE000.00000004.00000020.00020000.00000000.sdmp, cscript.exe, 0000000B.00000002.2477266822.0000000003108000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\securitycenter : AntiVirusProduct
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\securitycenter2 : AntiVirusProduct
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\securitycenter : AntiVirusProduct
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\securitycenter2 : AntiVirusProduct
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\securitycenter : AntiVirusProduct
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\securitycenter2 : AntiVirusProduct
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\securitycenter : AntiVirusProduct
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\securitycenter2 : AntiVirusProduct
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\securitycenter : AntiVirusProduct
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\securitycenter2 : AntiVirusProduct
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\securitycenter : AntiVirusProduct
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\securitycenter2 : AntiVirusProduct
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\securitycenter : AntiVirusProduct
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\securitycenter2 : AntiVirusProduct
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\securitycenter : AntiVirusProduct
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\securitycenter2 : AntiVirusProduct
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\securitycenter : AntiVirusProduct
          Source: C:\Windows\SysWOW64\cscript.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\securitycenter2 : AntiVirusProduct

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: amsi32_8080.amsi.csv, type: OTHER
          Source: Yara matchFile source: amsi32_8100.amsi.csv, type: OTHER
          Source: Yara matchFile source: Process Memory Space: cscript.exe PID: 8080, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: cscript.exe PID: 8100, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: amsi32_8080.amsi.csv, type: OTHER
          Source: Yara matchFile source: amsi32_8100.amsi.csv, type: OTHER
          Source: Yara matchFile source: Process Memory Space: cscript.exe PID: 8080, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: cscript.exe PID: 8100, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity Information22
          Scripting
          Valid Accounts11
          Windows Management Instrumentation
          22
          Scripting
          11
          Process Injection
          1
          Masquerading
          OS Credential Dumping121
          Security Software Discovery
          Remote ServicesData from Local System1
          Non-Standard Port
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/Job21
          Registry Run Keys / Startup Folder
          21
          Registry Run Keys / Startup Folder
          11
          Process Injection
          LSASS Memory2
          File and Directory Discovery
          Remote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAt1
          DLL Side-Loading
          1
          DLL Side-Loading
          2
          Obfuscated Files or Information
          Security Account Manager2
          System Information Discovery
          SMB/Windows Admin SharesData from Network Shared Drive11
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          DLL Side-Loading
          NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.