Analysis Overview
score
1/10
SHA256
54ced04c35919d49102ca4f306f5d43c7ef0fe60c05cd2500df0df11ced96dbe
Threat Level: No (potentially) malicious behavior was detected
The file Loi_sur_la_gestion_contractuelle.js was found to be: No (potentially) malicious behavior was detected.
Malicious Activity Summary
N/A
MITRE ATT&CK
N/A
Analysis: static1
Detonation Overview
Reported
2022-09-27 20:31
Signatures
N/A
Analysis: behavioral1
Detonation Overview
Submitted
2022-09-27 20:31
Reported
2022-09-27 20:36
Platform
win10v2004-20220812-en
Max time kernel
300s
Max time network
302s
Command Line
wscript.exe C:\Users\Admin\AppData\Local\Temp\Loi_sur_la_gestion_contractuelle.js
Signatures
N/A
Processes
C:\Windows\system32\wscript.exe
wscript.exe C:\Users\Admin\AppData\Local\Temp\Loi_sur_la_gestion_contractuelle.js
Network
| Country | Destination | Domain | Proto |
| NL | 95.101.78.82:80 | tcp | |
| US | 93.184.220.29:80 | tcp | |
| NL | 104.80.225.205:443 | tcp | |
| US | 8.8.8.8:53 | 16.44.117.100.in-addr.arpa | udp |
| US | 93.184.221.240:80 | tcp |
Files
N/A