analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

MSG_49.vbs

Full analysis: https://app.any.run/tasks/a2ce0bb9-866f-4013-9330-ba4505ae81e9
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: March 30, 2020, 17:35:18
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
MIME: text/plain
File info: ASCII text, with very long lines
MD5:

217E60FAB073A621758C3CCDE1953F6F

SHA1:

3C03A504FCA4DA748439307C60B6AEBA3E06FA18

SHA256:

0B553940EB505DE97EF567BD3F6DF6FA37EE0E9DB02010B10B21AD841DDFBFBB

SSDEEP:

49152:0p1ebzuHmmvGIgi90RiLtHKuzvfE3eUYn15+oSyQllQH2xwWWQwG9sgwYJ4PTeRd:V

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads the Task Scheduler COM API

      • WScript.exe (PID: 2400)
    • Changes settings of System certificates

      • WScript.exe (PID: 2400)
  • SUSPICIOUS

    • Adds / modifies Windows certificates

      • WScript.exe (PID: 2400)
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 3248)
    • Manual execution by user

      • WINWORD.EXE (PID: 3248)
    • Reads settings of System Certificates

      • WScript.exe (PID: 2400)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3248)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wscript.exe winword.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2400"C:\Windows\System32\WScript.exe" "C:\Users\admin\Desktop\MSG_49.vbs"C:\Windows\System32\WScript.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
3248"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\fivelink.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
Total events
4 991
Read events
749
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
3
Unknown types
4

Dropped files

PID
Process
Filename
Type
3248WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR9CB5.tmp.cvr
MD5:
SHA256:
3248WINWORD.EXEC:\Users\admin\Desktop\~$velink.rtfpgc
MD5:39F3A624F2C4C6F17773C653F206952F
SHA256:D4778B5BC26DC2C97A861A95BC28FC081BF987491FCF9295A37C6076CEAD9653
3248WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\fivelink.rtf.LNKlnk
MD5:9943E65620ED5CAFF7CB93F03E445039
SHA256:DDE2DF5B02D50A8AE83A21EB36B98F0CB63EDC06F5AF9E6F69EB888EE4461597
3248WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:18A00629E8925D018306BFCC468BAF62
SHA256:D7478640312F237A21BD0C7C731255194B32C8C321AFBDDFFC59EBA454DE75EF
3248WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.datini
MD5:FF879CA7D9E7BEFCE254CB04D893F3B1
SHA256:AC3635B86E15E6727A21B7D60A1CC8394FD591CA1DD9556ECBBE6A3AD6A5CBDB
3248WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lextext
MD5:F3B25701FE362EC84616A93A45CE9998
SHA256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
5
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2400
WScript.exe
GET
200
43.252.88.207:80
http://worldplaces.in/direct/444444.png?uid=TQBpAGMAcgBvAHMAbwBmAHQAIABXAGkAbgBkAG8AdwBzACAANwAgAFAAcgBvAGYAZQBzAHMAaQBvAG4AYQBsACAA
IN
malicious
2400
WScript.exe
GET
301
77.75.34.175:80
http://suaritmaservisi.co/direct/444444.png?uid=TQBpAGMAcgBvAHMAbwBmAHQAIABXAGkAbgBkAG8AdwBzACAANwAgAFAAcgBvAGYAZQBzAHMAaQBvAG4AYQBsACAA
TR
malicious
2400
WScript.exe
GET
200
160.153.73.137:80
http://t.unplugrevolution.com/articles/18928/2910.png?uid=TQBpAGMAcgBvAHMAbwBmAHQAIABXAGkAbgBkAG8AdwBzACAANwAgAFAAcgBvAGYAZQBzAHMAaQBvAG4AYQBsACAA
US
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2400
WScript.exe
77.75.34.175:80
suaritmaservisi.co
Radore Veri Merkezi Hizmetleri A.S.
TR
malicious
2400
WScript.exe
43.252.88.207:80
worldplaces.in
Netmagic Datacenter Mumbai
IN
malicious
2400
WScript.exe
160.153.73.137:80
t.unplugrevolution.com
GoDaddy.com, LLC
US
malicious
2400
WScript.exe
66.198.240.35:80
stickit.ae
A2 Hosting, Inc.
US
malicious
2400
WScript.exe
77.75.34.175:443
suaritmaservisi.co
Radore Veri Merkezi Hizmetleri A.S.
TR
malicious

DNS requests

Domain
IP
Reputation
stickit.ae
  • 66.198.240.35
malicious
suaritmaservisi.co
  • 77.75.34.175
malicious
worldplaces.in
  • 43.252.88.207
malicious
t.unplugrevolution.com
  • 160.153.73.137
malicious

Threats

Found threats are available for the paid subscriptions
4 ETPRO signatures available at the full report
No debug info