Report - Docs_Request_06(29).js

ScreenShot
Created 2023.06.15 10:42 Machine s1_win7_x6402
Filename Docs_Request_06(29).js
Type ASCII text, with very long lines, with no line terminators
AI Score Not founds Behavior Score
10.0
ZERO API file : clean
VT API (file)
md5 70820d263876261cc2d28fb8839adb18
sha256 5555d89d81accd51098d43fbf8f93d4e0604b0935402f7af08658d3104a57f82
ssdeep 24576:YG3SWQkY6xWx7VKTaTGCMlL2POZU29L/Nzz9aFG6SmT6jA/WgIvO4IqGpeOWbH8+:+WQkY6xWx7VKTaqCMlL2PO629L/Nzz9h
imphash
impfuzzy
  Network IP location

Signature (5cnts)

Level Description
watch Network communications indicative of a potential document or script payload download was initiated by the process wscript.exe
watch Wscript.exe initiated network communications indicative of a script based payload download
watch wscript.exe-based dropper (JScript
notice Allocates read-write-execute memory (usually to unpack itself)
info One or more processes crashed

Rules (0cnts)

Level Name Description Collection

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
masar-alulaedu.com US A2HOSTING 68.66.248.36 malware
68.66.248.36 US A2HOSTING 68.66.248.36 malware

Suricata ids



Similarity measure (PE file only) - Checking for service failure