File name:

gatherNetworkInfo.vbs

Full analysis: https://app.any.run/tasks/8ef592ff-eaf8-408d-80bc-b2e0480892b1
Verdict: Malicious activity
Analysis date: May 22, 2024, 01:04:41
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/plain
File info: ASCII text, with CRLF line terminators
MD5:

DA4D4261A43DE7E851A9378ED0668EB9

SHA1:

E4227677479EFB82B6E7044BCC1B28CB9CB5A4F5

SHA256:

1C9337004CBD0E1E5C09BEE609EE1991BE3AA791C31F1C873E6D8F70C3C876D0

SSDEEP:

1536:sImNGeeGUJIgZf/A+qfwkgKo9kNxyJ3OOjPl68fef0qLbIE5ToGaUKTYL7TBHQ/E:sImNGXGUJtx/A+qfol6yqEs8q

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Accesses environment variables (SCRIPT)

      • wscript.exe (PID: 3956)
    • Creates a new folder (SCRIPT)

      • wscript.exe (PID: 3956)
    • Checks whether a specified folder exists (SCRIPT)

      • wscript.exe (PID: 3956)
    • Opens a text file (SCRIPT)

      • wscript.exe (PID: 3956)
    • Gets %windir% folder path (SCRIPT)

      • wscript.exe (PID: 3956)
    • Accesses the network adapter (Win32_NetworkAdapter) via WMI (SCRIPT)

      • wscript.exe (PID: 3956)
    • Accesses name of a computer manufacturer via WMI (SCRIPT)

      • wscript.exe (PID: 3956)
  • SUSPICIOUS

    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 3956)
    • Reads the Internet Settings

      • wscript.exe (PID: 3956)
      • dxdiag.exe (PID: 1424)
    • Group Policy Discovery via Microsoft GPResult Utility

      • cmd.exe (PID: 3992)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 3956)
    • Starts CMD.EXE for commands execution

      • wscript.exe (PID: 3956)
    • Writes binary data to a Stream object (SCRIPT)

      • wscript.exe (PID: 3956)
    • Executes WMI query (SCRIPT)

      • wscript.exe (PID: 3956)
    • Uses WMI to retrieve WMI-managed resources (SCRIPT)

      • wscript.exe (PID: 3956)
    • Uses powercfg.exe to modify the power settings

      • cmd.exe (PID: 2424)
    • Get information on the list of running processes

      • wscript.exe (PID: 3956)
      • cmd.exe (PID: 948)
    • Reads data from a binary Stream object (SCRIPT)

      • wscript.exe (PID: 3956)
    • Uses WEVTUTIL.EXE to export log

      • cmd.exe (PID: 2784)
      • cmd.exe (PID: 2824)
      • cmd.exe (PID: 2896)
      • cmd.exe (PID: 4092)
      • cmd.exe (PID: 3540)
      • cmd.exe (PID: 4024)
      • cmd.exe (PID: 2204)
    • Uses WEVTUTIL.EXE to archive the exported log

      • cmd.exe (PID: 2792)
      • cmd.exe (PID: 2960)
      • cmd.exe (PID: 3040)
      • cmd.exe (PID: 3860)
      • cmd.exe (PID: 3828)
      • cmd.exe (PID: 2316)
      • cmd.exe (PID: 1580)
    • Reads settings of System Certificates

      • certutil.exe (PID: 1936)
      • dxdiag.exe (PID: 1424)
    • Uses NETSH.EXE to obtain data on the network

      • cmd.exe (PID: 3492)
      • cmd.exe (PID: 3208)
      • cmd.exe (PID: 3248)
      • cmd.exe (PID: 2728)
      • cmd.exe (PID: 1964)
      • cmd.exe (PID: 2956)
    • Suspicious use of NETSH.EXE

      • cmd.exe (PID: 3760)
      • cmd.exe (PID: 4064)
      • cmd.exe (PID: 3508)
      • cmd.exe (PID: 3916)
      • cmd.exe (PID: 2516)
      • cmd.exe (PID: 2840)
      • cmd.exe (PID: 2736)
      • cmd.exe (PID: 3092)
      • cmd.exe (PID: 3516)
      • cmd.exe (PID: 2168)
      • cmd.exe (PID: 2432)
      • cmd.exe (PID: 2776)
      • cmd.exe (PID: 2356)
      • cmd.exe (PID: 2520)
      • cmd.exe (PID: 4028)
      • cmd.exe (PID: 3040)
    • Process uses IPCONFIG to discover network configuration

      • cmd.exe (PID: 2036)
      • cmd.exe (PID: 2136)
    • Uses ROUTE.EXE to obtain the routing table information

      • cmd.exe (PID: 1856)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 1028)
      • cmd.exe (PID: 2412)
      • cmd.exe (PID: 2436)
      • cmd.exe (PID: 2704)
      • cmd.exe (PID: 2536)
      • cmd.exe (PID: 2928)
    • Accesses Windows installation date via WMI (SCRIPT)

      • wscript.exe (PID: 3956)
    • Accesses computer name via WMI (SCRIPT)

      • wscript.exe (PID: 3956)
    • Accesses WMI object caption (SCRIPT)

      • wscript.exe (PID: 3956)
  • INFO

    • Create files in a temporary directory

      • reg.exe (PID: 4044)
      • reg.exe (PID: 1120)
      • reg.exe (PID: 2024)
      • dispdiag.exe (PID: 1820)
      • dxdiag.exe (PID: 1424)
    • Reads security settings of Internet Explorer

      • dxdiag.exe (PID: 1424)
    • Reads the software policy settings

      • dxdiag.exe (PID: 1424)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 1852)
    • Checks supported languages

      • wmpnscfg.exe (PID: 1852)
    • Reads the computer name

      • wmpnscfg.exe (PID: 1852)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
261
Monitored processes
143
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
start wscript.exe cmd.exe no specs cmd.exe no specs reg.exe no specs gpresult.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs cmd.exe no specs systeminfo.exe no specs cmd.exe no specs cmd.exe no specs powercfg.exe no specs cmd.exe no specs tasklist.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs ipconfig.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs route.exe no specs cmd.exe no specs certutil.exe no specs cmd.exe no specs certutil.exe no specs cmd.exe no specs certutil.exe no specs cmd.exe no specs certutil.exe no specs cmd.exe no specs certutil.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs wevtutil.exe no specs cmd.exe no specs dxdiag.exe wmpnscfg.exe no specs cmd.exe no specs dispdiag.exe no specs cmd.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs sc.exe no specs cmd.exe no specs sc.exe no specs cmd.exe no specs sc.exe no specs cmd.exe no specs sc.exe no specs cmd.exe no specs sc.exe no specs cmd.exe no specs sc.exe no specs cmd.exe no specs ipconfig.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs netsh.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
112"C:\Windows\System32\cmd.exe" /c reg export "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Provider Filters" Reg\AllCredFilter.reg.txt /yC:\Windows\System32\cmd.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
316"C:\Windows\System32\cmd.exe" /c echo ROUTE PRINT: >> config\envinfo.txtC:\Windows\System32\cmd.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
560"C:\Windows\System32\cmd.exe" /c systeminfo >> config\osinfo.txtC:\Windows\System32\cmd.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
580certutil -v -store -silent -user My C:\Windows\System32\certutil.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CertUtil.exe
Exit code:
0
Version:
6.1.7601.18151 (win7sp1_gdr.130512-1533)
Modules
Images
c:\windows\system32\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\certcli.dll
c:\windows\system32\atl.dll
768"C:\Windows\System32\cmd.exe" /c dxdiag /t dxdiag.txtC:\Windows\System32\cmd.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
824"C:\Windows\System32\cmd.exe" /c certutil -v -enterprise -store -silent NTAuth >> config\envinfo.txtC:\Windows\System32\cmd.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
2147942402
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
904powercfg.exe /batteryreport /output config\battery-report.htmlC:\Windows\System32\powercfg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Power Settings Command-Line Tool
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\powercfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
928netsh advfirewall monitor show currentprofile C:\Windows\System32\netsh.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
948"C:\Windows\System32\cmd.exe" /c tasklist /svc > processes.txtC:\Windows\System32\cmd.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
948sc query eaphost C:\Windows\System32\sc.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
A tool to aid in developing services for WindowsNT
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
30 981
Read events
29 717
Write events
1 248
Delete events
16

Modification events

(PID) Process:(3956) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3956) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3956) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3956) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1848) systeminfo.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1848) systeminfo.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:@%SystemRoot%\system32\mlang.dll,-4386
Value:
English (United States)
(PID) Process:(2952) netsh.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2952) netsh.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:@%SystemRoot%\system32\dhcpqec.dll,-100
Value:
DHCP Quarantine Enforcement Client
(PID) Process:(2952) netsh.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:@%SystemRoot%\system32\dhcpqec.dll,-101
Value:
Provides DHCP based enforcement for NAP
(PID) Process:(2952) netsh.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:@%SystemRoot%\system32\dhcpqec.dll,-103
Value:
1.0
Executable files
0
Suspicious files
5
Text files
17
Unknown types
0

Dropped files

PID
Process
Filename
Type
1120reg.exeC:\Users\admin\AppData\Local\Temp\REG3990.tmptext
MD5:4F693526D6BF0DB816FEB171B6CE309D
SHA256:5E7635A97B9332375689FBE7362742690E79F1675CA548650D195DA60CADC85F
2024reg.exeC:\Users\admin\AppData\Local\Temp\REG39CF.tmptext
MD5:9A5A295EFDC30925C631166A5D041BD3
SHA256:88275B3C833910726328D29FB29F50FF6E5D357E8D3F316362C6D709D5FA5EF5
948cmd.exeC:\Users\admin\AppData\Local\Temp\processes.txttext
MD5:BA4D52BC4659FD91E629D724B3D2C169
SHA256:150B24E1E0091913AD0DD43DEEB0E8EAD60B4E24F95D66B09ADC070CB2D76AE2
4044reg.exeC:\Users\admin\AppData\Local\Temp\Reg\Notif.reg.txttext
MD5:0572A78575AA7DA541EE94C4081C9053
SHA256:E8409F1706A481F7CE1DC8F6ED2C0E0C4F75A010D27C39C5D240BB42706BE3BD
3956wscript.exeC:\Users\admin\AppData\Local\Temp\config\osinfo.txttext
MD5:C0205219CB5287D35C031F5239196BF2
SHA256:0DE7759F2E8E1A55D71729420D823EEFCA68DB450967F29AE63FF029BD610649
2024reg.exeC:\Users\admin\AppData\Local\Temp\Reg\AllCredFilter.reg.txttext
MD5:9A5A295EFDC30925C631166A5D041BD3
SHA256:88275B3C833910726328D29FB29F50FF6E5D357E8D3F316362C6D709D5FA5EF5
3992cmd.exeC:\Users\admin\AppData\Local\Temp\config\gpresult.txttext
MD5:6CD3AB2AA8B7B5CCC083C99E4525F7E2
SHA256:0FE202BDA37CC8E2D50CA5AB811C535F1A42887960583E946745327369748117
3956wscript.exeC:\Users\admin\AppData\Local\Temp\config\adapterinfo.txttext
MD5:9D802859FD9B5EA73A3E091B1C0BD756
SHA256:FE76734F917305044829017FC0DCCCEC32E33A1E74A038067ABD8297F338F715
1120reg.exeC:\Users\admin\AppData\Local\Temp\Reg\AllCred.reg.txttext
MD5:4F693526D6BF0DB816FEB171B6CE309D
SHA256:5E7635A97B9332375689FBE7362742690E79F1675CA548650D195DA60CADC85F
4044reg.exeC:\Users\admin\AppData\Local\Temp\REG3952.tmptext
MD5:0572A78575AA7DA541EE94C4081C9053
SHA256:E8409F1706A481F7CE1DC8F6ED2C0E0C4F75A010D27C39C5D240BB42706BE3BD
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
5
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1424
dxdiag.exe
GET
200
23.50.131.200:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?7ada1ce17af523a3
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
unknown
1088
svchost.exe
224.0.0.252:5355
unknown
1424
dxdiag.exe
23.50.131.200:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown

DNS requests

Domain
IP
Reputation
ctldl.windowsupdate.com
  • 23.50.131.200
  • 23.50.131.216
whitelisted

Threats

No threats detected
No debug info