File name:

formulario.vbs

Full analysis: https://app.any.run/tasks/692de6e5-b365-41fa-ae73-4d2d4fe65cb2
Verdict: Malicious activity
Analysis date: July 17, 2019, 12:19:54
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines, with CRLF line terminators
MD5:

9666AE84E0388999E2DD0E5840AFB842

SHA1:

AD17346FE052CE2291A6405085457D01827B57A1

SHA256:

2A41A1B251F51061CEE75D74F520159E29FD9A90663F1E8090CC7674542BDCC5

SSDEEP:

48:UFES+lEX+0lIf5RC+0lIfp/+fnw+ChjjDpIllEf1DjZ0SKlfziVVVyfCjQddlIEo:Kuva3qyg

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • WScript.exe (PID: 3960)
      • wscript.exe (PID: 4076)
    • Writes to a start menu file

      • WScript.exe (PID: 3960)
      • wscript.exe (PID: 4076)
  • SUSPICIOUS

    • Application launched itself

      • WScript.exe (PID: 3960)
    • Executes scripts

      • WScript.exe (PID: 3960)
    • Creates files in the user directory

      • WScript.exe (PID: 3960)
  • INFO

    • Manual execution by user

      • explorer.exe (PID: 1692)
      • Notepad.exe (PID: 2528)
      • WScript.exe (PID: 3960)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wscript.exe no specs explorer.exe no specs notepad.exe no specs wscript.exe wscript.exe

Process information

PID
CMD
Path
Indicators
Parent process
1692"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2528"C:\Windows\System32\Notepad.exe" C:\Users\admin\AppData\Local\Temp\salida.vbsC:\Windows\System32\Notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3028"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\formulario.vbs"C:\Windows\System32\WScript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3960"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\salida.vbs" C:\Windows\System32\WScript.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
4076"C:\Windows\System32\wscript.exe" //B "C:\Users\admin\AppData\Roaming\salida.vbs"C:\Windows\System32\wscript.exe
WScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
323
Read events
290
Write events
33
Delete events
0

Modification events

(PID) Process:(2528) Notepad.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Notepad
Operation:writeName:iWindowPosX
Value:
66
(PID) Process:(2528) Notepad.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Notepad
Operation:writeName:iWindowPosY
Value:
66
(PID) Process:(2528) Notepad.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Notepad
Operation:writeName:iWindowPosDX
Value:
960
(PID) Process:(2528) Notepad.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Notepad
Operation:writeName:iWindowPosDY
Value:
501
(PID) Process:(3960) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\salida
Operation:writeName:
Value:
false - 7/17/2019
(PID) Process:(3960) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:salida
Value:
wscript.exe //B "C:\Users\admin\AppData\Roaming\salida.vbs"
(PID) Process:(3960) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:salida
Value:
wscript.exe //B "C:\Users\admin\AppData\Roaming\salida.vbs"
(PID) Process:(3960) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3960) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(4076) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:salida
Value:
wscript.exe //B "C:\Users\admin\AppData\Roaming\salida.vbs"
Executable files
0
Suspicious files
0
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
4076wscript.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\salida.vbstext
MD5:
SHA256:
3028WScript.exeC:\Users\admin\AppData\Local\Temp\salida.vbstext
MD5:
SHA256:
3960WScript.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\salida.vbstext
MD5:
SHA256:
3960WScript.exeC:\Users\admin\AppData\Roaming\salida.vbstext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
1
DNS requests
2
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4076
wscript.exe
POST
159.147.61.52:6444
http://hiddenmyftp.duckdns.org:6444/is-ready
ES
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4076
wscript.exe
159.147.61.52:6444
hiddenmyftp.duckdns.org
Vodafone Spain
ES
malicious

DNS requests

Domain
IP
Reputation
hiddenmyftp.duckdns.org
  • 159.147.61.52
malicious

Threats

PID
Process
Class
Message
1044
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
1044
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
No debug info