File name:

gatherNetworkInfo.vbs

Full analysis: https://app.any.run/tasks/8ef592ff-eaf8-408d-80bc-b2e0480892b1
Verdict: Malicious activity
Analysis date: May 22, 2024, 01:04:41
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/plain
File info: ASCII text, with CRLF line terminators
MD5:

DA4D4261A43DE7E851A9378ED0668EB9

SHA1:

E4227677479EFB82B6E7044BCC1B28CB9CB5A4F5

SHA256:

1C9337004CBD0E1E5C09BEE609EE1991BE3AA791C31F1C873E6D8F70C3C876D0

SSDEEP:

1536:sImNGeeGUJIgZf/A+qfwkgKo9kNxyJ3OOjPl68fef0qLbIE5ToGaUKTYL7TBHQ/E:sImNGXGUJtx/A+qfol6yqEs8q

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Accesses environment variables (SCRIPT)

      • wscript.exe (PID: 3956)
    • Creates a new folder (SCRIPT)

      • wscript.exe (PID: 3956)
    • Checks whether a specified folder exists (SCRIPT)

      • wscript.exe (PID: 3956)
    • Opens a text file (SCRIPT)

      • wscript.exe (PID: 3956)
    • Gets %windir% folder path (SCRIPT)

      • wscript.exe (PID: 3956)
    • Accesses the network adapter (Win32_NetworkAdapter) via WMI (SCRIPT)

      • wscript.exe (PID: 3956)
    • Accesses name of a computer manufacturer via WMI (SCRIPT)

      • wscript.exe (PID: 3956)
  • SUSPICIOUS

    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 3956)
    • Reads the Internet Settings

      • wscript.exe (PID: 3956)
      • dxdiag.exe (PID: 1424)
    • Group Policy Discovery via Microsoft GPResult Utility

      • cmd.exe (PID: 3992)
    • Uses WEVTUTIL.EXE to archive the exported log

      • cmd.exe (PID: 2792)
      • cmd.exe (PID: 2960)
      • cmd.exe (PID: 3040)
      • cmd.exe (PID: 3860)
      • cmd.exe (PID: 3828)
      • cmd.exe (PID: 2316)
      • cmd.exe (PID: 1580)
    • Uses WEVTUTIL.EXE to export log

      • cmd.exe (PID: 2824)
      • cmd.exe (PID: 2896)
      • cmd.exe (PID: 2784)
      • cmd.exe (PID: 4024)
      • cmd.exe (PID: 4092)
      • cmd.exe (PID: 2204)
      • cmd.exe (PID: 3540)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 3956)
    • Executes WMI query (SCRIPT)

      • wscript.exe (PID: 3956)
    • Starts CMD.EXE for commands execution

      • wscript.exe (PID: 3956)
    • Writes binary data to a Stream object (SCRIPT)

      • wscript.exe (PID: 3956)
    • Uses WMI to retrieve WMI-managed resources (SCRIPT)

      • wscript.exe (PID: 3956)
    • Uses powercfg.exe to modify the power settings

      • cmd.exe (PID: 2424)
    • Get information on the list of running processes

      • wscript.exe (PID: 3956)
      • cmd.exe (PID: 948)
    • Reads data from a binary Stream object (SCRIPT)

      • wscript.exe (PID: 3956)
    • Uses NETSH.EXE to obtain data on the network

      • cmd.exe (PID: 3492)
      • cmd.exe (PID: 2728)
      • cmd.exe (PID: 3208)
      • cmd.exe (PID: 3248)
      • cmd.exe (PID: 1964)
      • cmd.exe (PID: 2956)
    • Suspicious use of NETSH.EXE

      • cmd.exe (PID: 3760)
      • cmd.exe (PID: 3092)
      • cmd.exe (PID: 3916)
      • cmd.exe (PID: 3508)
      • cmd.exe (PID: 4064)
      • cmd.exe (PID: 2168)
      • cmd.exe (PID: 2516)
      • cmd.exe (PID: 2432)
      • cmd.exe (PID: 2776)
      • cmd.exe (PID: 2840)
      • cmd.exe (PID: 2736)
      • cmd.exe (PID: 2520)
      • cmd.exe (PID: 2356)
      • cmd.exe (PID: 3516)
      • cmd.exe (PID: 4028)
      • cmd.exe (PID: 3040)
    • Process uses IPCONFIG to discover network configuration

      • cmd.exe (PID: 2036)
      • cmd.exe (PID: 2136)
    • Reads settings of System Certificates

      • certutil.exe (PID: 1936)
      • dxdiag.exe (PID: 1424)
    • Uses ROUTE.EXE to obtain the routing table information

      • cmd.exe (PID: 1856)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 2436)
      • cmd.exe (PID: 1028)
      • cmd.exe (PID: 2928)
      • cmd.exe (PID: 2536)
      • cmd.exe (PID: 2412)
      • cmd.exe (PID: 2704)
    • Accesses computer name via WMI (SCRIPT)

      • wscript.exe (PID: 3956)
    • Accesses Windows installation date via WMI (SCRIPT)

      • wscript.exe (PID: 3956)
    • Accesses WMI object caption (SCRIPT)

      • wscript.exe (PID: 3956)
  • INFO

    • Create files in a temporary directory

      • reg.exe (PID: 4044)
      • reg.exe (PID: 1120)
      • reg.exe (PID: 2024)
      • dispdiag.exe (PID: 1820)
      • dxdiag.exe (PID: 1424)
    • Reads security settings of Internet Explorer

      • dxdiag.exe (PID: 1424)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 1852)
    • Reads the computer name

      • wmpnscfg.exe (PID: 1852)
    • Checks supported languages

      • wmpnscfg.exe (PID: 1852)
    • Reads the software policy settings

      • dxdiag.exe (PID: 1424)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
261
Monitored processes
143
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
start wscript.exe cmd.exe no specs cmd.exe no specs reg.exe no specs gpresult.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs cmd.exe no specs systeminfo.exe no specs cmd.exe no specs cmd.exe no specs powercfg.exe no specs cmd.exe no specs tasklist.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs ipconfig.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs route.exe no specs cmd.exe no specs certutil.exe no specs cmd.exe no specs certutil.exe no specs cmd.exe no specs certutil.exe no specs cmd.exe no specs certutil.exe no specs cmd.exe no specs certutil.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs dxdiag.exe wmpnscfg.exe no specs cmd.exe no specs dispdiag.exe no specs cmd.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs sc.exe no specs cmd.exe no specs sc.exe no specs cmd.exe no specs sc.exe no specs cmd.exe no specs sc.exe no specs cmd.exe no specs sc.exe no specs cmd.exe no specs sc.exe no specs cmd.exe no specs ipconfig.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs netsh.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
112"C:\Windows\System32\cmd.exe" /c reg export "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Provider Filters" Reg\AllCredFilter.reg.txt /yC:\Windows\System32\cmd.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
316"C:\Windows\System32\cmd.exe" /c echo ROUTE PRINT: >> config\envinfo.txtC:\Windows\System32\cmd.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
560"C:\Windows\System32\cmd.exe" /c systeminfo >> config\osinfo.txtC:\Windows\System32\cmd.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
580certutil -v -store -silent -user My C:\Windows\System32\certutil.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CertUtil.exe
Exit code:
0
Version:
6.1.7601.18151 (win7sp1_gdr.130512-1533)
Modules
Images
c:\windows\system32\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\certcli.dll
c:\windows\system32\atl.dll
768"C:\Windows\System32\cmd.exe" /c dxdiag /t dxdiag.txtC:\Windows\System32\cmd.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
824"C:\Windows\System32\cmd.exe" /c certutil -v -enterprise -store -silent NTAuth >> config\envinfo.txtC:\Windows\System32\cmd.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
2147942402
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
904powercfg.exe /batteryreport /output config\battery-report.htmlC:\Windows\System32\powercfg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Power Settings Command-Line Tool
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\powercfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
928netsh advfirewall monitor show currentprofile C:\Windows\System32\netsh.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
948"C:\Windows\System32\cmd.exe" /c tasklist /svc > processes.txtC:\Windows\System32\cmd.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
948sc query eaphost C:\Windows\System32\sc.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
A tool to aid in developing services for WindowsNT
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
30 981
Read events
29 717
Write events
1 248
Delete events
16

Modification events

(PID) Process:(3956) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3956) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3956) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3956) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1848) systeminfo.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1848) systeminfo.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:@%SystemRoot%\system32\mlang.dll,-4386
Value:
English (United States)
(PID) Process:(2952) netsh.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2952) netsh.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:@%SystemRoot%\system32\dhcpqec.dll,-100
Value:
DHCP Quarantine Enforcement Client
(PID) Process:(2952) netsh.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:@%SystemRoot%\system32\dhcpqec.dll,-101
Value:
Provides DHCP based enforcement for NAP
(PID) Process:(2952) netsh.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:@%SystemRoot%\system32\dhcpqec.dll,-103
Value:
1.0
Executable files
0
Suspicious files
5
Text files
17
Unknown types
0

Dropped files

PID
Process
Filename
Type
4044reg.exeC:\Users\admin\AppData\Local\Temp\REG3952.tmptext
MD5:0572A78575AA7DA541EE94C4081C9053
SHA256:E8409F1706A481F7CE1DC8F6ED2C0E0C4F75A010D27C39C5D240BB42706BE3BD
1120reg.exeC:\Users\admin\AppData\Local\Temp\REG3990.tmptext
MD5:4F693526D6BF0DB816FEB171B6CE309D
SHA256:5E7635A97B9332375689FBE7362742690E79F1675CA548650D195DA60CADC85F
3956wscript.exeC:\Users\admin\AppData\Local\Temp\config\osinfo.txttext
MD5:C0205219CB5287D35C031F5239196BF2
SHA256:0DE7759F2E8E1A55D71729420D823EEFCA68DB450967F29AE63FF029BD610649
2024reg.exeC:\Users\admin\AppData\Local\Temp\REG39CF.tmptext
MD5:9A5A295EFDC30925C631166A5D041BD3
SHA256:88275B3C833910726328D29FB29F50FF6E5D357E8D3F316362C6D709D5FA5EF5
4044reg.exeC:\Users\admin\AppData\Local\Temp\Reg\Notif.reg.txttext
MD5:0572A78575AA7DA541EE94C4081C9053
SHA256:E8409F1706A481F7CE1DC8F6ED2C0E0C4F75A010D27C39C5D240BB42706BE3BD
3956wscript.exeC:\Users\admin\AppData\Local\Temp\config\wlaninfo.txttext
MD5:3803004BBE62440259C78E26CAA816BD
SHA256:D0D3E0AACA17C51D781ED4CA6D3D8023EF1B7D374368CB81AD3B9575EA9A8D88
2476cmd.exeC:\Users\admin\AppData\Local\Temp\config\WindowsFirewallConfig.txttext
MD5:AD8950C6786F15B97C301AA2901E8CA0
SHA256:6EAC416B5702E44C8E91729AA5B0B24D4FD79EBC723D3572E67807198B5935D5
2516cmd.exeC:\Users\admin\AppData\Local\Temp\config\WinsockCatalog.txttext
MD5:F3D10F11CB7BF29E8FCE8709976593A9
SHA256:9A57205ED2C2ED381A5F5790F307F90EA0F88B73500B11E1E08E5B3100B80EA3
1424dxdiag.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506compressed
MD5:29F65BA8E88C063813CC50A4EA544E93
SHA256:1ED81FA8DFB6999A9FEDC6E779138FFD99568992E22D300ACD181A6D2C8DE184
1424dxdiag.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506binary
MD5:8DA5BEF753849193AF9EC3C83594FC6B
SHA256:A56DE9015C55C945076BFAF48D86F27EA82E016562B7E921D0C27B738AC2E5D1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
5
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1424
dxdiag.exe
GET
200
23.50.131.200:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?7ada1ce17af523a3
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
4
System
192.168.100.255:138
unknown
1088
svchost.exe
224.0.0.252:5355
unknown
1424
dxdiag.exe
23.50.131.200:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown

DNS requests

Domain
IP
Reputation
ctldl.windowsupdate.com
  • 23.50.131.200
  • 23.50.131.216
unknown

Threats

No threats detected
No debug info