Loading ...

Play interactive tourEdit tour

Analysis Report http://codepoints.net/static/js/codepoint.js!3c67217e710120291b75e8c13546e320?_=1618365050047

Overview

General Information

Sample URL:http://codepoints.net/static/js/codepoint.js!3c67217e710120291b75e8c13546e320?_=1618365050047
Analysis ID:392890
Infos:

Most interesting Screenshot:

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Found WSH timer for Javascript or VBS script (likely evasive script)
Queries the volume information (name, serial number etc) of a device
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • cmd.exe (PID: 7108 cmdline: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'http://codepoints.net/static/js/codepoint.js!3c67217e710120291b75e8c13546e320?_=1618365050047' > cmdline.out 2>&1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • conhost.exe (PID: 7128 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • wget.exe (PID: 6188 cmdline: wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'http://codepoints.net/static/js/codepoint.js!3c67217e710120291b75e8c13546e320?_=1618365050047' MD5: 3DADB6E2ECE9C4B3E1E322E617658B60)
  • wscript.exe (PID: 6728 cmdline: 'C:\Windows\System32\WScript.exe' 'C:\Users\user\Desktop\download\codepoint.js!3c67217e710120291b75e8c13546e320@_=1618365050047.js' MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownHTTPS traffic detected: 172.67.132.46:443 -> 192.168.2.4:49757 version: TLS 1.2
Source: global trafficHTTP traffic detected: GET /static/js/codepoint.js!3c67217e710120291b75e8c13546e320?_=1618365050047 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like GeckoAccept: */*Accept-Encoding: identityHost: codepoints.netConnection: Keep-Alive
Source: unknownDNS traffic detected: queries for: codepoints.net
Source: wget.exe, 00000002.00000003.640620928.0000000002CFD000.00000004.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/CloudflareIncECCCA-3.crt
Source: wget.exe, 00000002.00000003.640620928.0000000002CFD000.00000004.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/CloudflareIncECCCA-3.crt0
Source: wget.exe, 00000002.00000002.640905312.0000000000B40000.00000004.00000020.sdmp, cmdline.out.2.drString found in binary or memory: http://codepoints.net/static/js/codepoint.js
Source: wget.exe, 00000002.00000003.640648036.0000000002CBC000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl
Source: wget.exe, 00000002.00000003.640648036.0000000002CBC000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: wget.exe, 00000002.00000003.640648036.0000000002CBC000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/CloudflareIncECCCA-3.crl
Source: wget.exe, 00000002.00000003.640620928.0000000002CFD000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/CloudflareIncECCCA-3.crl07
Source: wget.exe, 00000002.00000003.640648036.0000000002CBC000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl
Source: wget.exe, 00000002.00000002.641324998.0000000002CF2000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0m
Source: wget.exe, 00000002.00000003.640648036.0000000002CBC000.00000004.00000001.sdmp, wget.exe, 00000002.00000003.640620928.0000000002CFD000.00000004.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/CloudflareIncECCCA-3.crl
Source: wget.exe, 00000002.00000003.640620928.0000000002CFD000.00000004.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/CloudflareIncECCCA-3.crl0L
Source: wget.exe, 00000002.00000003.640648036.0000000002CBC000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com
Source: wget.exe, 00000002.00000003.640620928.0000000002CFD000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: wget.exe, 00000002.00000002.641324998.0000000002CF2000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0:
Source: cmdline.out.2.drString found in binary or memory: https://codepoints.net/static/js/codepoint.js
Source: wget.exe, 00000002.00000003.640620928.0000000002CFD000.00000004.00000001.sdmpString found in binary or memory: https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct
Source: wscript.exe, 00000004.00000003.644926297.000001E10A792000.00000004.00000001.sdmpString found in binary or memory: https://use.typekit.net
Source: wscript.exe, 00000004.00000003.645147006.000001E10A7DB000.00000004.00000001.sdmpString found in binary or memory: https://use.typekit.net:G
Source: wget.exe, 00000002.00000003.640648036.0000000002CBC000.00000004.00000001.sdmpString found in binary or memory: https://www.digicert.com/CPS0
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownHTTPS traffic detected: 172.67.132.46:443 -> 192.168.2.4:49757 version: TLS 1.2
Source: classification engineClassification label: clean1.win@5/3@1/2
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\Desktop\cmdline.outJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7128:120:WilError_01
Source: C:\Windows\SysWOW64\wget.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\SysWOW64\wget.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\wget.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'http://codepoints.net/static/js/codepoint.js!3c67217e710120291b75e8c13546e320?_=1618365050047' > cmdline.out 2>&1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'http://codepoints.net/static/js/codepoint.js!3c67217e710120291b75e8c13546e320?_=1618365050047'
Source: unknownProcess created: C:\Windows\System32\wscript.exe 'C:\Windows\System32\WScript.exe' 'C:\Users\user\Desktop\download\codepoint.js!3c67217e710120291b75e8c13546e320@_=1618365050047.js'
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'http://codepoints.net/static/js/codepoint.js!3c67217e710120291b75e8c13546e320?_=1618365050047' Jump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
Source: C:\Windows\System32\wscript.exeAutomated click: OK
Source: C:\Windows\System32\wscript.exeAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_02CB08CF push cs; retf 2_2_02CB08E6
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_02CB0A4F push cs; retf 2_2_02CB0A66
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_02CB03D7 push eax; retf 2_2_02CB0406
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_02CB0B6F push ds; retf 2_2_02CB0B86
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_02CB047F push es; retf 2_2_02CB050E
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_02CB0C77 pushad ; retf 2_2_02CB0CA6
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_02CB050F push ds; retf 2_2_02CB059E
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_02CB0107 push ss; retf 2_2_02CB011E
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_02CB0197 push cs; retf 2_2_02CB01C6
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_02CB04AF push es; retf 2_2_02CB050E
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_02CB0C2F push eax; retf 2_2_02CB0C76
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_02CB06BF pushad ; retf 2_2_02CB06D6
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: C:\Windows\SysWOW64\wget.exeQueries volume information: C:\Users\user\Desktop\download VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\wget.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting1Path InterceptionProcess Injection1Masquerading1OS Credential DumpingSystem Information Discovery12Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryRemote System Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Scripting1Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferIngress Tool Transfer1SIM Card SwapCarrier Billing Fraud

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 392890 URL: http://codepoints.net/stati... Startdate: 19/04/2021 Architecture: WINDOWS Score: 1 5 cmd.exe 2 2->5         started        7 wscript.exe 2->7         started        process3 9 wget.exe 3 5->9         started        12 conhost.exe 5->12         started        dnsIp4 14 codepoints.net 172.67.132.46, 443, 49756, 49757 CLOUDFLARENETUS United States 9->14 16 192.168.2.1 unknown unknown 9->16

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
http://codepoints.net/static/js/codepoint.js!3c67217e710120291b75e8c13546e320?_=16183650500470%Avira URL Cloudsafe

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
https://use.typekit.net:G0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
codepoints.net
172.67.132.46
truefalse
    high

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    http://codepoints.net/static/js/codepoint.js!3c67217e710120291b75e8c13546e320?_=1618365050047false
      high

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      https://use.typekit.netwscript.exe, 00000004.00000003.644926297.000001E10A792000.00000004.00000001.sdmpfalse
        high
        https://use.typekit.net:Gwscript.exe, 00000004.00000003.645147006.000001E10A7DB000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        low
        https://codepoints.net/static/js/codepoint.jscmdline.out.2.drfalse
          high
          http://codepoints.net/static/js/codepoint.jswget.exe, 00000002.00000002.640905312.0000000000B40000.00000004.00000020.sdmp, cmdline.out.2.drfalse
            high

            Contacted IPs

            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs

            Public

            IPDomainCountryFlagASNASN NameMalicious
            172.67.132.46
            codepoints.netUnited States
            13335CLOUDFLARENETUSfalse

            Private

            IP
            192.168.2.1

            General Information

            Joe Sandbox Version:31.0.0 Emerald
            Analysis ID:392890
            Start date:19.04.2021
            Start time:23:56:19
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 2m 28s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:urldownload.jbs
            Sample URL:http://codepoints.net/static/js/codepoint.js!3c67217e710120291b75e8c13546e320?_=1618365050047
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:5
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:CLEAN
            Classification:clean1.win@5/3@1/2
            EGA Information:Failed
            HDC Information:Failed
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Stop behavior analysis, all processes terminated
            Warnings:
            Show All
            • Exclude process from analysis (whitelisted): svchost.exe
            • Excluded IPs from analysis (whitelisted): 104.43.139.144, 104.43.193.48, 40.88.32.150, 52.255.188.83
            • Excluded domains from analysis (whitelisted): skypedataprdcoleus15.cloudapp.net, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, skypedataprdcolcus16.cloudapp.net, watson.telemetry.microsoft.com, skypedataprdcolcus15.cloudapp.net
            • Execution Graph export aborted for target wget.exe, PID 6188 because there are no executed function
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.

            Simulations

            Behavior and APIs

            No simulations

            Joe Sandbox View / Context

            IPs

            No context

            Domains

            No context

            ASN

            No context

            JA3 Fingerprints

            No context

            Dropped Files

            No context

            Created / dropped Files

            C:\Users\user\Desktop\cmdline.out
            Process:C:\Windows\SysWOW64\wget.exe
            File Type:ASCII text, with CRLF line terminators
            Category:modified
            Size (bytes):1084
            Entropy (8bit):5.158605751644497
            Encrypted:false
            SSDEEP:24:PoGM1ZWw+2ZWXxeP6xMZovPoxMM2ZWSxePgSb7FnN6Kb71:AGAWwXZWXbexCZWSYb+KbJ
            MD5:499EEFC60ADFE5425E5B2662B63E459C
            SHA1:22F0C635D5D645E832C084A3039BEF90D0CD0F9E
            SHA-256:4C3983BA84EFC540F73F75A54375171A15FBF216469DD5D06D67AD47F7F14465
            SHA-512:B74D6D28B6EAA6D19B612DAA86AC6E965CB23E5D58C5447BB47BE187F5460940EF9329A589029C5FE73F6BF41DA0A498F79EE20F3560D5B82879477AEDDA625D
            Malicious:false
            Reputation:low
            Preview: --2021-04-19 23:57:03-- http://codepoints.net/static/js/codepoint.js!3c67217e710120291b75e8c13546e320?_=1618365050047..Resolving codepoints.net (codepoints.net)... 172.67.132.46, 104.21.12.155..Connecting to codepoints.net (codepoints.net)|172.67.132.46|:80... connected...HTTP request sent, awaiting response... 301 Moved Permanently..Location: https://codepoints.net/static/js/codepoint.js!3c67217e710120291b75e8c13546e320?_=1618365050047 [following]..--2021-04-19 23:57:03-- https://codepoints.net/static/js/codepoint.js!3c67217e710120291b75e8c13546e320?_=1618365050047..Connecting to codepoints.net (codepoints.net)|172.67.132.46|:443... connected...HTTP request sent, awaiting response... 200 OK..Length: unspecified [application/javascript]..Saving to: 'C:/Users/user/Desktop/download/codepoint.js!3c67217e710120291b75e8c13546e320@_=1618365050047'.... 0K .......... .......... .......... 352K=0.09s....2021-04-19 23:57:04 (352 KB/s) - 'C:/Users/user/Desktop/downl
            C:\Users\user\Desktop\download\.wget-hsts
            Process:C:\Windows\SysWOW64\wget.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):173
            Entropy (8bit):5.135446645530035
            Encrypted:false
            SSDEEP:3:SY2FyFARLlbwFAM9CxnOLVFzDwIVhyyJxWQ5RdkA8dyDFs0XRcRBsWaov:SYeRLlbA0noH9VhyyJQQ5oA8UDi5XsWT
            MD5:12EEDA5DB822588D995F9481D35EFBED
            SHA1:CAA0F4033F580F969D906396D9B4F8384F2FBAF3
            SHA-256:F5C45299A53223ABB1B3222A47614D9BF2BA89B778278B440371515BF25EF80D
            SHA-512:B971ADFF69992DAE09974A9683C4A46C86E50A36F3007C544E449E391856C8099821E0178D996C58FA4DB06E2BA195340DA4D7005417629948FD8A7910A6B1C6
            Malicious:false
            Reputation:low
            Preview: # HSTS 1.0 Known Hosts database for GNU Wget...# Edit at your own risk...# <hostname>.<port>.<incl. subdomains>.<created>.<max-age>..codepoints.net.0.0.1618869424.31536000..
            C:\Users\user\Desktop\download\codepoint.js!3c67217e710120291b75e8c13546e320@_=1618365050047
            Process:C:\Windows\SysWOW64\wget.exe
            File Type:UTF-8 Unicode text, with very long lines, with no line terminators
            Category:dropped
            Size (bytes):31433
            Entropy (8bit):5.334704231959762
            Encrypted:false
            SSDEEP:768:hkhSZhy+WU3ex7lVB3vCg+nMo9mNaOHf8cKXJXac:hAw3ClGoVKXJXD
            MD5:3C67217E710120291B75E8C13546E320
            SHA1:AA9D4DC6BCB030B4B3669D98D1F2474D60544A5C
            SHA-256:BC3DAD26E9361E22809C5DA883066BFC4C724FDFBD552BB6E048F7DF5353FA38
            SHA-512:8F2EA8352350BBEE3E7E43F258D0607778BB27695F9E664F06E3689B1B6C1696FEC7C34122F882F8EBC726F0D4D47035C1E10A2EF52CDC6E5B497F9096AD0459
            Malicious:false
            Reputation:low
            Preview: !function(a){function b(a,b,e){return 4===arguments.length?c.apply(this,arguments):void d(a,{declarative:!0,deps:b,declare:e})}function c(a,b,c,e){d(a,{declarative:!1,deps:b,executingRequire:c,execute:e})}function d(a,b){b.name=a,a in n||(n[a]=b),b.normalizedDeps=b.deps}function e(a,b){if(b[a.groupIndex]=b[a.groupIndex]||[],-1==o.call(b[a.groupIndex],a)){b[a.groupIndex].push(a);for(var c=0,d=a.normalizedDeps.length;d>c;c++){var f=a.normalizedDeps[c],g=n[f];if(g&&!g.evaluated){var h=a.groupIndex+(g.declarative!=a.declarative);if(void 0===g.groupIndex||g.groupIndex<h){if(void 0!==g.groupIndex&&(b[g.groupIndex].splice(o.call(b[g.groupIndex],g),1),0==b[g.groupIndex].length))throw new TypeError("Mixed dependency cycle detected");g.groupIndex=h}e(g,b)}}}}function f(a){var b=n[a];b.groupIndex=0;var c=[];e(b,c);for(var d=!!b.declarative==c.length%2,f=c.length-1;f>=0;f--){for(var g=c[f],i=0;i<g.length;i++){var k=g[i];d?h(k):j(k)}d=!d}}function g(a){return s[a]||(s[a]={name:a,dependencies:[],exp

            Static File Info

            No static file info

            Network Behavior

            Network Port Distribution

            TCP Packets

            TimestampSource PortDest PortSource IPDest IP
            Apr 19, 2021 23:57:03.519366980 CEST4975680192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:03.571017981 CEST8049756172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:03.571142912 CEST4975680192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:03.572415113 CEST4975680192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:03.623956919 CEST8049756172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:03.673808098 CEST8049756172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:03.673851967 CEST8049756172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:03.673914909 CEST4975680192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:03.766424894 CEST49757443192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:03.818058968 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:03.818173885 CEST49757443192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:03.822818041 CEST49757443192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:03.875365019 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:03.879390955 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:03.879448891 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:03.879513979 CEST49757443192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:03.882630110 CEST49757443192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:03.935578108 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:03.935746908 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:03.938401937 CEST49757443192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:03.989964008 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.108247995 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.108270884 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.108290911 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.108304024 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.108319044 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.108335972 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.108350992 CEST49757443192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:04.108352900 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.108372927 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.108380079 CEST49757443192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:04.108396053 CEST49757443192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:04.108416080 CEST49757443192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:04.109473944 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.109492064 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.109659910 CEST49757443192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:04.110627890 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.110646963 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.110697985 CEST49757443192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:04.111912966 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.111929893 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.111999035 CEST49757443192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:04.113037109 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.113058090 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.113158941 CEST49757443192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:04.114347935 CEST4975680192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:04.114356995 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.114382982 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.114444017 CEST49757443192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:04.115513086 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.115535975 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.115586042 CEST49757443192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:04.116678953 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.116703033 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.116754055 CEST49757443192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:04.118690014 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.118721962 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.118782043 CEST49757443192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:04.119077921 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.119107008 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.119172096 CEST49757443192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:04.120260954 CEST44349757172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.168994904 CEST8049756172.67.132.46192.168.2.4
            Apr 19, 2021 23:57:04.169087887 CEST4975680192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:04.170644999 CEST49757443192.168.2.4172.67.132.46
            Apr 19, 2021 23:57:04.579210043 CEST49757443192.168.2.4172.67.132.46

            UDP Packets

            TimestampSource PortDest PortSource IPDest IP
            Apr 19, 2021 23:56:55.975506067 CEST5370053192.168.2.48.8.8.8
            Apr 19, 2021 23:56:56.024126053 CEST53537008.8.8.8192.168.2.4
            Apr 19, 2021 23:56:56.861954927 CEST5172653192.168.2.48.8.8.8
            Apr 19, 2021 23:56:56.923043966 CEST53517268.8.8.8192.168.2.4
            Apr 19, 2021 23:56:57.825664997 CEST5679453192.168.2.48.8.8.8
            Apr 19, 2021 23:56:57.874341011 CEST53567948.8.8.8192.168.2.4
            Apr 19, 2021 23:57:00.310434103 CEST5653453192.168.2.48.8.8.8
            Apr 19, 2021 23:57:00.359138966 CEST53565348.8.8.8192.168.2.4
            Apr 19, 2021 23:57:01.310204029 CEST5662753192.168.2.48.8.8.8
            Apr 19, 2021 23:57:01.361684084 CEST53566278.8.8.8192.168.2.4
            Apr 19, 2021 23:57:02.209863901 CEST5662153192.168.2.48.8.8.8
            Apr 19, 2021 23:57:02.258493900 CEST53566218.8.8.8192.168.2.4
            Apr 19, 2021 23:57:03.230737925 CEST6311653192.168.2.48.8.8.8
            Apr 19, 2021 23:57:03.281030893 CEST53631168.8.8.8192.168.2.4
            Apr 19, 2021 23:57:03.451055050 CEST6407853192.168.2.48.8.8.8
            Apr 19, 2021 23:57:03.509973049 CEST53640788.8.8.8192.168.2.4
            Apr 19, 2021 23:57:04.222884893 CEST6480153192.168.2.48.8.8.8
            Apr 19, 2021 23:57:04.272931099 CEST53648018.8.8.8192.168.2.4
            Apr 19, 2021 23:57:05.138631105 CEST6172153192.168.2.48.8.8.8
            Apr 19, 2021 23:57:05.188189983 CEST53617218.8.8.8192.168.2.4
            Apr 19, 2021 23:57:06.364178896 CEST5125553192.168.2.48.8.8.8
            Apr 19, 2021 23:57:06.424177885 CEST53512558.8.8.8192.168.2.4
            Apr 19, 2021 23:57:07.255764008 CEST6152253192.168.2.48.8.8.8
            Apr 19, 2021 23:57:07.307087898 CEST53615228.8.8.8192.168.2.4
            Apr 19, 2021 23:57:08.427530050 CEST5233753192.168.2.48.8.8.8
            Apr 19, 2021 23:57:08.476598978 CEST53523378.8.8.8192.168.2.4
            Apr 19, 2021 23:57:09.322879076 CEST5504653192.168.2.48.8.8.8
            Apr 19, 2021 23:57:09.373547077 CEST53550468.8.8.8192.168.2.4
            Apr 19, 2021 23:57:11.222143888 CEST4961253192.168.2.48.8.8.8
            Apr 19, 2021 23:57:11.280639887 CEST53496128.8.8.8192.168.2.4
            Apr 19, 2021 23:57:12.014138937 CEST4928553192.168.2.48.8.8.8
            Apr 19, 2021 23:57:12.075429916 CEST53492858.8.8.8192.168.2.4
            Apr 19, 2021 23:57:12.836302996 CEST5060153192.168.2.48.8.8.8
            Apr 19, 2021 23:57:12.887886047 CEST53506018.8.8.8192.168.2.4
            Apr 19, 2021 23:57:13.731420994 CEST6087553192.168.2.48.8.8.8
            Apr 19, 2021 23:57:13.784745932 CEST53608758.8.8.8192.168.2.4
            Apr 19, 2021 23:57:14.555850983 CEST5644853192.168.2.48.8.8.8
            Apr 19, 2021 23:57:14.615953922 CEST53564488.8.8.8192.168.2.4

            DNS Queries

            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
            Apr 19, 2021 23:57:03.451055050 CEST192.168.2.48.8.8.80x983fStandard query (0)codepoints.netA (IP address)IN (0x0001)

            DNS Answers

            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
            Apr 19, 2021 23:57:03.509973049 CEST8.8.8.8192.168.2.40x983fNo error (0)codepoints.net172.67.132.46A (IP address)IN (0x0001)
            Apr 19, 2021 23:57:03.509973049 CEST8.8.8.8192.168.2.40x983fNo error (0)codepoints.net104.21.12.155A (IP address)IN (0x0001)

            HTTP Request Dependency Graph

            • codepoints.net

            HTTP Packets

            Session IDSource IPSource PortDestination IPDestination PortProcess
            0192.168.2.449756172.67.132.4680C:\Windows\SysWOW64\wget.exe
            TimestampkBytes transferredDirectionData
            Apr 19, 2021 23:57:03.572415113 CEST961OUTGET /static/js/codepoint.js!3c67217e710120291b75e8c13546e320?_=1618365050047 HTTP/1.1
            User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko
            Accept: */*
            Accept-Encoding: identity
            Host: codepoints.net
            Connection: Keep-Alive
            Apr 19, 2021 23:57:03.673808098 CEST967INHTTP/1.1 301 Moved Permanently
            Date: Mon, 19 Apr 2021 21:57:03 GMT
            Content-Type: text/html
            Transfer-Encoding: chunked
            Connection: keep-alive
            Set-Cookie: __cfduid=d3be4f12ed524a7cd3868342ba1761cd71618869423; expires=Wed, 19-May-21 21:57:03 GMT; path=/; domain=.codepoints.net; HttpOnly; SameSite=Lax
            Location: https://codepoints.net/static/js/codepoint.js!3c67217e710120291b75e8c13546e320?_=1618365050047
            CF-Cache-Status: DYNAMIC
            cf-request-id: 098dbc25f80000002aab92e000000001
            Report-To: {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=NNQcSV3PT8t8qOGlICLeYqxtoNdnw7ZU4GCDzEAq4iGppRU5ExR7aW7prz0%2FYemWCQ6Z9kdCaVNDNRsOQQeuvDvtZn0uB1xRhM6mGSOHig%3D%3D"}]}
            NEL: {"max_age":604800,"report_to":"cf-nel"}
            Server: cloudflare
            CF-RAY: 642962e98c9c002a-LHR
            alt-svc: h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400
            Data Raw: 61 32 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a
            Data Ascii: a2<html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>
            Apr 19, 2021 23:57:03.673851967 CEST967INData Raw: 30 0d 0a 0d 0a
            Data Ascii: 0


            HTTPS Packets

            TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
            Apr 19, 2021 23:57:03.879448891 CEST172.67.132.46443192.168.2.449757CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=CA, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEFri Jul 24 02:00:00 CEST 2020 Mon Jan 27 13:48:08 CET 2020Sat Jul 24 14:00:00 CEST 2021 Wed Jan 01 00:59:59 CET 2025771,49196-49200-159-52393-52392-52394-49195-49199-158-49188-49192-107-49187-49191-103-49162-49172-57-49161-49171-51-157-156-61-60-53-47-255,0-11-10-35-22-23-13,29-23-25-24,0-1-2807fca46d9d0cf63adf4e5e80e414bbe
            CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025

            Code Manipulations

            Statistics

            CPU Usage

            Click to jump to process

            Memory Usage

            Click to jump to process

            High Level Behavior Distribution

            Click to dive into process behavior distribution

            Behavior

            Click to jump to process

            System Behavior

            General

            Start time:23:57:01
            Start date:19/04/2021
            Path:C:\Windows\SysWOW64\cmd.exe
            Wow64 process (32bit):true
            Commandline:C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'http://codepoints.net/static/js/codepoint.js!3c67217e710120291b75e8c13546e320?_=1618365050047' > cmdline.out 2>&1
            Imagebase:0x11d0000
            File size:232960 bytes
            MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low

            General

            Start time:23:57:02
            Start date:19/04/2021
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff724c50000
            File size:625664 bytes
            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low

            General

            Start time:23:57:03
            Start date:19/04/2021
            Path:C:\Windows\SysWOW64\wget.exe
            Wow64 process (32bit):true
            Commandline:wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'http://codepoints.net/static/js/codepoint.js!3c67217e710120291b75e8c13546e320?_=1618365050047'
            Imagebase:0x400000
            File size:3895184 bytes
            MD5 hash:3DADB6E2ECE9C4B3E1E322E617658B60
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low

            General

            Start time:23:57:05
            Start date:19/04/2021
            Path:C:\Windows\System32\wscript.exe
            Wow64 process (32bit):false
            Commandline:'C:\Windows\System32\WScript.exe' 'C:\Users\user\Desktop\download\codepoint.js!3c67217e710120291b75e8c13546e320@_=1618365050047.js'
            Imagebase:0x7ff6c83b0000
            File size:163840 bytes
            MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low

            Disassembly

            Code Analysis

            Reset < >