Size | 63.4KB |
---|---|
Type | HTML document, Unicode text, UTF-8 text, with very long lines (13579), with CRLF, LF line terminators |
MD5 | 91cf90ecd9bb76486cf5bc85987de4f1 |
SHA1 | b7c58487b1237af0c73a5f34f88d42c94fa29609 |
SHA256 | 2fa42b78742d0ba5ae655fd0e918828ac021200805a7d0af52b85a267d117142 |
SHA512 |
648a5b42ee855e2210071b7df15ee770d0b2bd98583b2db8c30bae9f09bbdacebc3b6ec0cced97cea83f6cbeb9e0669d6f656e893099eb073406f05854f31f19
|
CRC32 | 13490BCB |
ssdeep | None |
Yara |
|
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | July 30, 2025, 4:24 p.m. | July 30, 2025, 4:31 p.m. | 413 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-07-27 05:56:04,030 [analyzer] DEBUG: Starting analyzer from: C:\tmpj6atou 2025-07-27 05:56:04,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\QufwMkkVOqeLGuIrYPhLlCO 2025-07-27 05:56:04,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\VmciHaiglxujUwCeooUcKZWiLuZ 2025-07-27 05:56:04,375 [analyzer] DEBUG: Started auxiliary module Curtain 2025-07-27 05:56:04,390 [analyzer] DEBUG: Started auxiliary module DbgView 2025-07-27 05:56:05,203 [analyzer] DEBUG: Started auxiliary module Disguise 2025-07-27 05:56:05,421 [analyzer] DEBUG: Loaded monitor into process with pid 504 2025-07-27 05:56:05,437 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-07-27 05:56:05,437 [analyzer] DEBUG: Started auxiliary module Human 2025-07-27 05:56:05,437 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-07-27 05:56:05,453 [analyzer] DEBUG: Started auxiliary module Reboot 2025-07-27 05:56:05,562 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-07-27 05:56:05,562 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-07-27 05:56:05,592 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-07-27 05:56:05,608 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n 2025-07-27 05:56:05,655 [modules.packages.js] INFO: Submitted file is missing extension, added .js 2025-07-27 05:56:05,812 [lib.api.process] INFO: Successfully executed process from path 'C:\\Windows\\System32\\wscript.exe' with arguments [u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\2fa42b78742d0ba5ae655fd0e918828ac021200805a7d0af52b85a267d117142.js'] and pid 2980 2025-07-27 05:56:06,078 [analyzer] DEBUG: Loaded monitor into process with pid 2980 2025-07-27 05:56:06,453 [analyzer] INFO: io=NULL 2025-07-27 05:56:06,453 [analyzer] DEBUG: Error resolving function jscript!ActiveXObjectFncObj_Construct through our custom callback. 2025-07-27 05:56:06,453 [analyzer] INFO: io=NULL 2025-07-27 05:56:06,453 [analyzer] DEBUG: Error resolving function jscript!COleScript_Compile through our custom callback. 2025-07-27 05:56:06,467 [analyzer] INFO: io=NULL 2025-07-27 05:56:06,467 [analyzer] DEBUG: Error resolving function jscript!Math_random through our custom callback. 2025-07-27 05:56:06,500 [analyzer] INFO: io=NULL 2025-07-27 05:56:06,500 [analyzer] DEBUG: Error resolving function jscript!ActiveXObjectFncObj_Construct through our custom callback. 2025-07-27 05:56:06,500 [analyzer] INFO: io=NULL 2025-07-27 05:56:06,515 [analyzer] DEBUG: Error resolving function jscript!COleScript_Compile through our custom callback. 2025-07-27 05:56:06,515 [analyzer] INFO: io=NULL 2025-07-27 05:56:06,515 [analyzer] DEBUG: Error resolving function jscript!Math_random through our custom callback. 2025-07-27 05:56:34,812 [analyzer] INFO: Analysis timeout hit, terminating analysis. 2025-07-27 05:56:35,280 [analyzer] INFO: Terminating remaining processes before shutdown. 2025-07-27 05:56:35,280 [lib.api.process] INFO: Successfully terminated process with pid 2980. 2025-07-27 05:56:35,280 [analyzer] INFO: Analysis completed.
2025-07-30 16:24:39,794 [cuckoo.core.scheduler] INFO: Task #6790747: acquired machine win7x6416 (label=win7x6416) 2025-07-30 16:24:39,795 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.216 for task #6790747 2025-07-30 16:24:40,391 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 1648025 (interface=vboxnet0, host=192.168.168.216) 2025-07-30 16:24:40,436 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6416 2025-07-30 16:24:41,829 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6416 to vmcloak 2025-07-30 16:27:56,482 [cuckoo.core.guest] INFO: Starting analysis #6790747 on guest (id=win7x6416, ip=192.168.168.216) 2025-07-30 16:27:57,490 [cuckoo.core.guest] DEBUG: win7x6416: not ready yet 2025-07-30 16:28:02,531 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6416, ip=192.168.168.216) 2025-07-30 16:28:02,653 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6416, ip=192.168.168.216, monitor=latest, size=6660546) 2025-07-30 16:28:04,217 [cuckoo.core.resultserver] DEBUG: Task #6790747: live log analysis.log initialized. 2025-07-30 16:28:05,596 [cuckoo.core.resultserver] DEBUG: Task #6790747 is sending a BSON stream 2025-07-30 16:28:06,299 [cuckoo.core.resultserver] DEBUG: Task #6790747 is sending a BSON stream 2025-07-30 16:28:07,154 [cuckoo.core.resultserver] DEBUG: Task #6790747: File upload for 'shots/0001.jpg' 2025-07-30 16:28:07,180 [cuckoo.core.resultserver] DEBUG: Task #6790747 uploaded file length: 133565 2025-07-30 16:28:08,277 [cuckoo.core.resultserver] DEBUG: Task #6790747: File upload for 'shots/0002.jpg' 2025-07-30 16:28:08,294 [cuckoo.core.resultserver] DEBUG: Task #6790747 uploaded file length: 136915 2025-07-30 16:28:19,208 [cuckoo.core.guest] DEBUG: win7x6416: analysis #6790747 still processing 2025-07-30 16:28:34,315 [cuckoo.core.guest] DEBUG: win7x6416: analysis #6790747 still processing 2025-07-30 16:28:35,281 [cuckoo.core.resultserver] DEBUG: Task #6790747: File upload for 'curtain/1753588595.03.curtain.log' 2025-07-30 16:28:35,284 [cuckoo.core.resultserver] DEBUG: Task #6790747 uploaded file length: 36 2025-07-30 16:28:35,512 [cuckoo.core.resultserver] DEBUG: Task #6790747: File upload for 'sysmon/1753588595.27.sysmon.xml' 2025-07-30 16:28:35,526 [cuckoo.core.resultserver] DEBUG: Task #6790747 uploaded file length: 1641184 2025-07-30 16:28:36,209 [cuckoo.core.resultserver] DEBUG: Task #6790747: File upload for 'shots/0003.jpg' 2025-07-30 16:28:36,227 [cuckoo.core.resultserver] DEBUG: Task #6790747 uploaded file length: 133565 2025-07-30 16:28:36,244 [cuckoo.core.resultserver] DEBUG: Task #6790747 had connection reset for <Context for LOG> 2025-07-30 16:28:37,331 [cuckoo.core.guest] INFO: win7x6416: analysis completed successfully 2025-07-30 16:28:37,347 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-07-30 16:28:37,369 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-07-30 16:28:38,995 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6416 to path /srv/cuckoo/cwd/storage/analyses/6790747/memory.dmp 2025-07-30 16:28:38,997 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6416 2025-07-30 16:31:32,764 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.216 for task #6790747 2025-07-30 16:31:33,562 [cuckoo.core.scheduler] DEBUG: Released database task #6790747 2025-07-30 16:31:33,617 [cuckoo.core.scheduler] INFO: Task #6790747: analysis procedure completed
description | Generic WScript dropper 3 | rule | dropper_generic_wscript3 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
G Data Antivirus (Windows) | Virus: Generic.JS.Obfs.B.D255C02D, JS:Trojan.JS.Agent.VAV (Engine A) |
Avast Core Security (Linux) | Script:SNH-gen [Trj] |
eScan Antivirus (Linux) | JS:Trojan.JS.Agent.VAV(DB) |
ESET Security (Windows) | JS/Agent.SEC trojan |
Sophos Anti-Virus (Linux) | Mal/JSInject-AB |
DrWeb Antivirus (Linux) | JS.Inject.177 |
Bitdefender Antivirus (Linux) | JS:Trojan.JS.Agent.VAV |
Emsisoft Commandline Scanner (Windows) | Generic.JS.Obfs.B.D255C02D (B) |
MicroWorld-eScan | Generic.JS.Obfs.B.D255C02D |
CTX | unknown.trojan.generic |
Arcabit | Generic.JS.Obfs.B.D255C02D [many] |
BitDefender | Generic.JS.Obfs.B.D255C02D |
Emsisoft | Generic.JS.Obfs.B.D255C02D (B) |
Ikarus | Trojan.JS.Agent |
Detected | |
Microsoft | Trojan:JS/Obfuse.CAC!MTB |
ZoneAlarm | Mal/JSInject-AB |
GData | HTML.Trojan.Redirector.CJ |
Varist | JS/DCAgent.CML |
Tencent | Html.Win32.Script.506199 |
huorong | Trojan/JS.Runner.l |
Fortinet | JS/Agent.A9C1!tr |