File name:

VER_081313490_2025-24-05-86712836_7756601174.vbs

Full analysis: https://app.any.run/tasks/fdf7ebcd-163f-400c-8870-e0d4f9303714
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: March 25, 2025, 07:51:24
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
stealer
delphi
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines (4730), with CRLF line terminators
MD5:

A82DFD71EB1542B4B92ACC470912DF09

SHA1:

F6E3BC0EE2D17C5F2CD2704560C62226E212AD3C

SHA256:

198E817151DB9B44F5F879135AA1D42285E8B04E573308F05FC47C5915A9186B

SSDEEP:

49152:rnnrpRo3SIQ4QhCeBcUs/IJg6IUnXTNRGON:P66s8n

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses base64 encoding (SCRIPT)

      • wscript.exe (PID: 7184)
    • Deletes a file (SCRIPT)

      • wscript.exe (PID: 7184)
    • Actions looks like stealing of personal data

      • poBHExdjdEvU.exe (PID: 7604)
  • SUSPICIOUS

    • Saves data to a binary file (SCRIPT)

      • wscript.exe (PID: 7184)
    • Creates a Stream, which may work with files, input/output devices, pipes, or TCP/IP sockets (SCRIPT)

      • wscript.exe (PID: 7184)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 7184)
    • Writes binary data to a Stream object (SCRIPT)

      • wscript.exe (PID: 7184)
    • Sets XML DOM element text (SCRIPT)

      • wscript.exe (PID: 7184)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 7184)
    • Likely accesses (executes) a file from the Public directory

      • poBHExdjdEvU.exe (PID: 7604)
    • Checks for external IP

      • svchost.exe (PID: 2196)
      • poBHExdjdEvU.exe (PID: 7604)
    • Connects to unusual port

      • poBHExdjdEvU.exe (PID: 7604)
    • There is functionality for communication over UDP network (YARA)

      • poBHExdjdEvU.exe (PID: 7604)
    • There is functionality for taking screenshot (YARA)

      • poBHExdjdEvU.exe (PID: 7604)
  • INFO

    • The sample compiled with english language support

      • wscript.exe (PID: 7184)
    • Checks supported languages

      • poBHExdjdEvU.exe (PID: 7604)
    • Reads the computer name

      • poBHExdjdEvU.exe (PID: 7604)
    • Reads the software policy settings

      • poBHExdjdEvU.exe (PID: 7604)
      • slui.exe (PID: 7504)
    • Checks proxy server information

      • poBHExdjdEvU.exe (PID: 7604)
    • Compiled with Borland Delphi (YARA)

      • poBHExdjdEvU.exe (PID: 7604)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.cnt | Help File Contents (100)
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
141
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wscript.exe no specs sppextcomobj.exe no specs slui.exe pobhexdjdevu.exe svchost.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
4108C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7184"C:\WINDOWS\System32\WScript.exe" C:\Users\admin\AppData\Local\Temp\VER_081313490_2025-24-05-86712836_7756601174.vbsC:\Windows\System32\wscript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7468C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7504"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7604"C:\Users\Public\poBHExdjdEvU.exe" C:\Users\Public\poBHExdjdEvU.exe
wscript.exe
User:
admin
Company:
CloudBridge Solutions 8624285 Inc.
Integrity Level:
MEDIUM
Description:
Advanced Data Protection Management 8624285, 35817.23513.13747.61906, Y242.
Exit code:
0
Version:
35817.23513.13747.61906
Modules
Images
c:\users\public\pobhexdjdevu.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\shell32.dll
c:\windows\syswow64\msvcp_win.dll
Total events
2 620
Read events
2 619
Write events
1
Delete events
0

Modification events

(PID) Process:(7184) wscript.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
Operation:writeName:{2781761E-28E0-4109-99FE-B9D127C57AFE} {56FFCC30-D398-11D0-B2AE-00A0C908FA49} 0xFFFF
Value:
01000000000000008EF573B95A9DDB01
Executable files
0
Suspicious files
2
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
7184wscript.exeC:\Users\Public\ZUAITIvrrfvk7S09PH3D1YVEY49U6GAPEvgvjr.hrc
MD5:
SHA256:
7184wscript.exeC:\Users\Public\poBHExdjdEvU.exe
MD5:
SHA256:
7184wscript.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-msbinary
MD5:77ACBD20CF4FCC3429E39B68B31C0018
SHA256:B144334616593CD140A4157AA8BDD5938B2A291763CB485CC93682A3FB3A7BF8
7184wscript.exeC:\Users\Public\dDKvllpVsk.txttext
MD5:D2EF22A223EF1395F551ADF30702B6B4
SHA256:6E9C37F17DBB918C3E6905B04D1FC2B90A5739C218CE097306C3BBCF0475DCA8
7184wscript.exeC:\Users\Public\poBHExdjdEvU.zipcompressed
MD5:AC96D7CABE532F489161271DE65B71E6
SHA256:66640BF128157E02B20ADC63AB45530B0416024BEF7D8F3377EC943B89427C25
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
31
DNS requests
16
Threats
16

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7604
poBHExdjdEvU.exe
GET
200
208.95.112.1:80
http://ip-api.com/json
unknown
whitelisted
7604
poBHExdjdEvU.exe
GET
200
208.95.112.1:80
http://ip-api.com/json
unknown
whitelisted
7604
poBHExdjdEvU.exe
GET
200
208.95.112.1:80
http://ip-api.com/json
unknown
whitelisted
7604
poBHExdjdEvU.exe
GET
200
208.95.112.1:80
http://ip-api.com/json
unknown
whitelisted
7572
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.16.164.72:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7604
poBHExdjdEvU.exe
GET
200
208.95.112.1:80
http://ip-api.com/json
unknown
whitelisted
7604
poBHExdjdEvU.exe
GET
200
208.95.112.1:80
http://ip-api.com/json
unknown
whitelisted
8152
SIHClient.exe
GET
200
92.123.22.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
192.168.100.255:137
whitelisted
5776
RUXIMICS.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
5496
MoUsoCoreWorker.exe
2.16.164.72:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5496
MoUsoCoreWorker.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
20.190.160.66:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.184.238
whitelisted
crl.microsoft.com
  • 2.16.164.72
  • 2.16.164.120
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
login.live.com
  • 20.190.160.66
  • 20.190.160.4
  • 40.126.32.72
  • 20.190.160.128
  • 40.126.32.134
  • 20.190.160.3
  • 20.190.160.130
  • 40.126.32.138
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
arc.msn.com
  • 20.199.58.43
whitelisted
ip-api.com
  • 208.95.112.1
whitelisted
dns.google
  • 8.8.4.4
  • 8.8.8.8
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
2196
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
7604
poBHExdjdEvU.exe
A Network Trojan was detected
ET USER_AGENTS Suspicious User-Agent (Clever Internet Suite)
7604
poBHExdjdEvU.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
7604
poBHExdjdEvU.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
7604
poBHExdjdEvU.exe
A Network Trojan was detected
ET USER_AGENTS Suspicious User-Agent (Clever Internet Suite)
7604
poBHExdjdEvU.exe
A Network Trojan was detected
ET USER_AGENTS Suspicious User-Agent (Clever Internet Suite)
7604
poBHExdjdEvU.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
7604
poBHExdjdEvU.exe
A Network Trojan was detected
ET USER_AGENTS Suspicious User-Agent (Clever Internet Suite)
7604
poBHExdjdEvU.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
No debug info