analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

formulario.vbs

Full analysis: https://app.any.run/tasks/692de6e5-b365-41fa-ae73-4d2d4fe65cb2
Verdict: Malicious activity
Analysis date: July 17, 2019, 12:19:54
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines, with CRLF line terminators
MD5:

9666AE84E0388999E2DD0E5840AFB842

SHA1:

AD17346FE052CE2291A6405085457D01827B57A1

SHA256:

2A41A1B251F51061CEE75D74F520159E29FD9A90663F1E8090CC7674542BDCC5

SSDEEP:

48:UFES+lEX+0lIf5RC+0lIfp/+fnw+ChjjDpIllEf1DjZ0SKlfziVVVyfCjQddlIEo:Kuva3qyg

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • WScript.exe (PID: 3960)
      • wscript.exe (PID: 4076)
    • Writes to a start menu file

      • WScript.exe (PID: 3960)
      • wscript.exe (PID: 4076)
  • SUSPICIOUS

    • Creates files in the user directory

      • WScript.exe (PID: 3960)
    • Executes scripts

      • WScript.exe (PID: 3960)
    • Application launched itself

      • WScript.exe (PID: 3960)
  • INFO

    • Manual execution by user

      • explorer.exe (PID: 1692)
      • WScript.exe (PID: 3960)
      • Notepad.exe (PID: 2528)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wscript.exe no specs explorer.exe no specs notepad.exe no specs wscript.exe wscript.exe

Process information

PID
CMD
Path
Indicators
Parent process
3028"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\formulario.vbs"C:\Windows\System32\WScript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
1692"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2528"C:\Windows\System32\Notepad.exe" C:\Users\admin\AppData\Local\Temp\salida.vbsC:\Windows\System32\Notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3960"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\salida.vbs" C:\Windows\System32\WScript.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
4076"C:\Windows\System32\wscript.exe" //B "C:\Users\admin\AppData\Roaming\salida.vbs"C:\Windows\System32\wscript.exe
WScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Version:
5.8.7600.16385
Total events
323
Read events
290
Write events
33
Delete events
0

Modification events

(PID) Process:(2528) Notepad.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Notepad
Operation:writeName:iWindowPosX
Value:
66
(PID) Process:(2528) Notepad.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Notepad
Operation:writeName:iWindowPosY
Value:
66
(PID) Process:(2528) Notepad.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Notepad
Operation:writeName:iWindowPosDX
Value:
960
(PID) Process:(2528) Notepad.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Notepad
Operation:writeName:iWindowPosDY
Value:
501
(PID) Process:(3960) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\salida
Operation:writeName:
Value:
false - 7/17/2019
(PID) Process:(3960) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:salida
Value:
wscript.exe //B "C:\Users\admin\AppData\Roaming\salida.vbs"
(PID) Process:(3960) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:salida
Value:
wscript.exe //B "C:\Users\admin\AppData\Roaming\salida.vbs"
(PID) Process:(3960) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3960) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(4076) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:salida
Value:
wscript.exe //B "C:\Users\admin\AppData\Roaming\salida.vbs"
Executable files
0
Suspicious files
0
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
3028WScript.exeC:\Users\admin\AppData\Local\Temp\salida.vbstext
MD5:6F98E56A4E9113F1517FFBE04FB50A25
SHA256:690B082D7951715C491BA9FF10AE1C6953AE9615BD1478CA2CDD55093C005238
3960WScript.exeC:\Users\admin\AppData\Roaming\salida.vbstext
MD5:6F98E56A4E9113F1517FFBE04FB50A25
SHA256:690B082D7951715C491BA9FF10AE1C6953AE9615BD1478CA2CDD55093C005238
4076wscript.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\salida.vbstext
MD5:6F98E56A4E9113F1517FFBE04FB50A25
SHA256:690B082D7951715C491BA9FF10AE1C6953AE9615BD1478CA2CDD55093C005238
3960WScript.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\salida.vbstext
MD5:6F98E56A4E9113F1517FFBE04FB50A25
SHA256:690B082D7951715C491BA9FF10AE1C6953AE9615BD1478CA2CDD55093C005238
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
1
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4076
wscript.exe
POST
159.147.61.52:6444
http://hiddenmyftp.duckdns.org:6444/is-ready
ES
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4076
wscript.exe
159.147.61.52:6444
hiddenmyftp.duckdns.org
Vodafone Spain
ES
malicious

DNS requests

Domain
IP
Reputation
hiddenmyftp.duckdns.org
  • 159.147.61.52
malicious

Threats

PID
Process
Class
Message
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
No debug info