Post

JS Analysis

What is JS?

Javascript is a client side object oriented scripting language. Authors of JavaScript scripts use a variety of techniques to obfuscate the scripts. For example, they can use confusing syntax, unusual commands, variables with random names, and junk code, to make it hard for us to understand the script’s logic.

Samples informaion

Sample NameSh1 Hash
loveyou.jsCE17790E9C0D1547F25AA3D30E38B5F17EB9FC8A

Valditaing for Common Functions

First we need to check if sample contains susipous calls

Linux

1
js-beautify loveyou.js | grep eval

grep eval Linux

Windows

1
findstr "eval" samplename.js

Analysis Methods

We have 3 main ways to analysis obfuscation javascript code,

Cscript Deobfuscation For Windows

  • you need to overwrite eval function, to print the eval output before running, you can prevent eval from runnuning by only output the string. Example: overwrite eval for cscript windows
1
csript.exe .\lovyou.js

deobfuscation with csript windows

if you wanna to run eval for any dynamic testing/wireshark traffic, you can update JS function as following

1
2
3
4
5
o_eval = eval;
eval = function(in_string) {
 WScript.Echo(in_string);
 o_eval(in_string);
 }

SpiderMonkey Deobfuscation For Linux

if we try to deobfuscation js directly, we will find that JS code depends on ActiveXObjects

1
js -f samle.js

SpiderMonkey deobfuscation activeXObject issue

JS might depend on windows object such as ActiveXobjects yoyu mighjt download object.js which will help to fix this dependency.

  • After fownload object.js, we can run spidermonkey with -f argument twoice and see the orignal JS code
1
js -f object.js -f sample.js

SpiderMonkey deobfuscation activeXObject

Windows AMSI Deobfuscation For Windows

We need to enable driver for logging, run the JS code in Windows native enviroment. Last step stop driver listening and save driver output

  • Enable AMSI driver listening
    1
    
    logman start mytrace -p Microsoft-Antimalware-Scan-Interface Event1 -o AMSITrace.etl -ets
    
  • Run the suspicious script
    1
    
    cscript loveyou.js
    
  • Stop AMSI driver monitoring
    1
    
     logman stop mytrace -ets
    
  • Save the driver logs, for investigation
    1
    
     AMSIScriptContentRetrieval > events.txt
    

    deobfuscation with AMSI windows Driver

If the malware using evasion techniques such as .callee.toString() to check that the orignal function eval/location did not be overwirtten. you can use js box for invistgation such as box-js

This post is licensed under CC BY 4.0 by the author.