ScreenShot
Created | 2023.05.22 08:53 | Machine | s1_win7_x6402 |
Filename | Inv(05-19)Copy#18-54-15.js | ||
Type | ASCII text, with very long lines, with no line terminators | ||
AI Score | Not founds | Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 2 detected (SLoad, ulch, iacgm) | ||
md5 | 89cde9b78c827ce1e542fddcdafce3a9 | ||
sha256 | 180a935383b39501c7bdf2745b3a334841f01a7df9d063fecca587b5cc3f5e7a | ||
ssdeep | 24576:q3nJVeMX/6PtJxFsIs/aJLdSGAsRu6jRGQwHCmUO0j99qKBh8/5QHRhkDho8YUm/:/MX/6PtJXsIs/aJLgGAsRu6jRtwHCjO4 | ||
imphash | |||
impfuzzy |
Network IP location
Signature (6cnts)
Level | Description |
---|---|
watch | Network communications indicative of a potential document or script payload download was initiated by the process wscript.exe |
watch | Wscript.exe initiated network communications indicative of a script based payload download |
watch | wscript.exe-based dropper (JScript |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | File has been identified by 2 AntiVirus engines on VirusTotal as malicious |
info | One or more processes crashed |
Rules (0cnts)
Level | Name | Description | Collection |
---|