Malware Analysis Report

2025-08-10 15:25

Sample ID 241103-e6p3tsvgnn
Target ForYouForFree
SHA256 dd2e8dbe9bfa3c2ca1504e3365a928ea291323923ff754d5d41ededc9246bcd1
Tags
execution
score
3/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
3/10

SHA256

dd2e8dbe9bfa3c2ca1504e3365a928ea291323923ff754d5d41ededc9246bcd1

Threat Level: Likely benign

The file ForYouForFree was found to be: Likely benign.

Malicious Activity Summary

execution

Command and Scripting Interpreter: JavaScript

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-03 04:33

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-03 04:33

Reported

2024-11-03 05:21

Platform

win11-20241007-en

Max time kernel

1466s

Max time network

1480s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\ForYouForFree.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\ForYouForFree.js

Network

Country Destination Domain Proto
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp

Files

N/A