Report - DOC757869856647.js

Gen1 Browser Login Data Stealer Generic Malware UPX Malicious Library Admin Tool (Sysinternals etc ...) ASPack Malicious Packer Anti_VM PE File DLL PE32 OS Processor Check ZIP Format DllRegisterServer dll ftp
ScreenShot
Created 2023.10.31 09:24 Machine s1_win7_x6401
Filename DOC757869856647.js
Type ASCII text, with very long lines
AI Score Not founds Behavior Score
8.8
ZERO API file : clean
VT API (file) 28 detected (Cryxos, Kryptik, Nemucod, dzzhbf, Umhl, Siggen21, Java, GenericGB, Detected, TOPIS, 8FLEVXabM7O, ai score=84)
md5 fdfd15e9fad07371318a7a30e8d9646e
sha256 40a7240d513c153891985d9445215a11fb340e277eacef40bb6260747126685a
ssdeep 6144:MQcZI583j+TAlalL1xW/RdOj19G48aXE4p/+Y:Xc6TAw5P/pHUI/3
imphash
impfuzzy
  Network IP location

Signature (18cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
warning File has been identified by 28 AntiVirus engines on VirusTotal as malicious
watch Installs itself for autorun at Windows startup
watch The process java.exe wrote an executable file to disk
watch Uses suspicious command line tools or Windows utilities
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Checks whether any human activity is being performed by constantly checking whether the foreground window changed
notice Connects to a Dynamic DNS Domain
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info One or more processes crashed
info Queries for the computername

Rules (16cnts)

Level Name Description Collection
danger infoStealer_browser_b_Zero browser info stealer binaries (download)
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Admin_Tool_IN_Zero Admin Tool Sysinternals binaries (download)
watch ASPack_Zero ASPack packed file binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch UPX_Zero UPX packed file binaries (download)
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (download)
info DllRegisterServer_Zero execute regsvr32.exe binaries (download)
info ftp_command ftp command binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info PE_Header_Zero PE File Signature binaries (download)
info zip_file_format ZIP file format binaries (download)

Network (11cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://wshsoft.company/jv/jrex.zip Unknown 185.232.14.169 clean
repo1.maven.org US FASTLY 199.232.196.209 clean
github.com US MICROSOFT-CORP-MSN-AS-BLOCK 20.200.245.247 mailcious
wshsoft.company Unknown 185.232.14.169 malware
50kteam.dynamic-dns.net NL RootLayer Web Services Ltd. 185.222.58.83 clean
objects.githubusercontent.com US FASTLY 185.199.109.133 malware
185.222.58.83 NL RootLayer Web Services Ltd. 185.222.58.83 clean
151.101.40.209 US FASTLY 151.101.40.209 clean
185.232.14.169 Unknown 185.232.14.169 clean
185.199.110.133 US FASTLY 185.199.110.133 malware
20.200.245.247 US MICROSOFT-CORP-MSN-AS-BLOCK 20.200.245.247 malware

Suricata ids



Similarity measure (PE file only) - Checking for service failure