File name:

mw.vbs

Full analysis: https://app.any.run/tasks/e0ccd07f-a4e0-4fb4-ae83-874f23044277
Verdict: Malicious activity
Analysis date: July 10, 2025, 07:05:07
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
susp-lnk
Indicators:
MIME: application/octet-stream
File info: data
MD5:

0A456FFFF1D3FD522457C187EBCF41E4

SHA1:

38D10544919BF3F1183BA6BF040E1CC3E156C3AE

SHA256:

3D929FBD23378F3246F6643F503E48AE8ECE5BDD8899E7DDF86568EBD044A2F2

SSDEEP:

192:93vF19G19+6SzeMr6u6dI4Ozl5B8BsdNN40yqlVHVex2XGVc:9N1Qi6SiMOtdI4OzlABsdr4RqlV1gWQc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Gets path to any of the special folders (SCRIPT)

      • wscript.exe (PID: 5020)
      • wscript.exe (PID: 5712)
    • Gets a file object corresponding to the file in a specified path (SCRIPT)

      • wscript.exe (PID: 5020)
      • wscript.exe (PID: 5712)
    • Opens a text file (SCRIPT)

      • wscript.exe (PID: 5020)
      • wscript.exe (PID: 5712)
    • Modifies registry startup key (SCRIPT)

      • wscript.exe (PID: 5712)
    • Creates a new registry key or changes the value of an existing one (SCRIPT)

      • wscript.exe (PID: 5712)
    • Uses sleep, probably for evasion detection (SCRIPT)

      • wscript.exe (PID: 5712)
  • SUSPICIOUS

    • Reads data from a binary Stream object (SCRIPT)

      • wscript.exe (PID: 5020)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 5020)
      • wscript.exe (PID: 5712)
    • Gets full path of the running script (SCRIPT)

      • wscript.exe (PID: 5020)
    • Checks whether a specific file exists (SCRIPT)

      • wscript.exe (PID: 5020)
      • wscript.exe (PID: 5712)
    • Writes binary data to a Stream object (SCRIPT)

      • wscript.exe (PID: 5020)
      • wscript.exe (PID: 5712)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 5020)
    • The process executes VB scripts

      • wscript.exe (PID: 5020)
    • Application launched itself

      • wscript.exe (PID: 5020)
    • Detected use of alternative data streams (AltDS)

      • wscript.exe (PID: 5712)
    • Gets a collection of all available drive names (SCRIPT)

      • wscript.exe (PID: 5712)
    • Accesses computer name via WMI (SCRIPT)

      • wscript.exe (PID: 5712)
    • Creates file in the systems drive root

      • wscript.exe (PID: 5712)
    • Accesses current user name via WMI (SCRIPT)

      • wscript.exe (PID: 5712)
    • Creates a Folder object (SCRIPT)

      • wscript.exe (PID: 5712)
    • Gets the drive type (SCRIPT)

      • wscript.exe (PID: 5712)
  • INFO

    • Reads the software policy settings

      • slui.exe (PID: 6268)
    • Checks proxy server information

      • slui.exe (PID: 6268)
    • Creates files in the program directory

      • wscript.exe (PID: 5712)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wscript.exe no specs wscript.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
5020"C:\WINDOWS\System32\WScript.exe" C:\Users\admin\AppData\Local\Temp\mw.vbsC:\Windows\System32\wscript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5712"C:\Windows\System32\wscript.exe" //e:VBScript C:\Users\admin\AppData\Local\Temp\rad5299E.tmp "C:\Users\admin\AppData\Local\Temp\mw.vbs"C:\Windows\System32\wscript.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6268C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
1 597
Read events
1 595
Write events
1
Delete events
1

Modification events

(PID) Process:(5712) wscript.exeKey:HKEY_CLASSES_ROOT\lnkfile
Operation:delete valueName:IsShortcut
Value:
(PID) Process:(5712) wscript.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Explorer
Value:
Wscript.exe //e:VBScript "C:\Users\admin\Documents\database.mdb"
Executable files
0
Suspicious files
18
Text files
2
Unknown types
67

Dropped files

PID
Process
Filename
Type
5020wscript.exeC:\Users\admin\AppData\Local\Temp\rad5299E.tmptext
MD5:977A2C8088B38E086137938079B25F43
SHA256:1B08C30E388C28E52F862A75230DC92C7338EE13B4CE3E606BF2A929ED349F52
5712wscript.exeC:\ProgramData\New Harry Potter and....lnklnk
MD5:D4A1A8145C16DE0ED5547DCA44400025
SHA256:578FE188151EBED556BEAA3EA922E22D8A80D21301FD4B0B9FAAFDC3DE575BD3
5712wscript.exeC:\ProgramData\Adobe\Thumb.dbbinary
MD5:0A456FFFF1D3FD522457C187EBCF41E4
SHA256:3D929FBD23378F3246F6643F503E48AE8ECE5BDD8899E7DDF86568EBD044A2F2
5712wscript.exeC:\Users\admin\AppData\Local\Temp\v.doctext
MD5:5F973C8004BE579518A85DFE2BCD56D7
SHA256:F48ED7892DD1743F121840D13CE017AABAEA41B121438ECA2FBF615352226A0A
5712wscript.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\Thumb.dbbinary
MD5:0A456FFFF1D3FD522457C187EBCF41E4
SHA256:3D929FBD23378F3246F6643F503E48AE8ECE5BDD8899E7DDF86568EBD044A2F2
5712wscript.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\Microsoft.lnklnk
MD5:F168868BE8AEDCE15C401F13EF1440DC
SHA256:72992A0F31447D543E68AE8D45767FA81BFB5E4A1865C9AFAA78AE198B96B71E
5712wscript.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\New Harry Potter and....lnklnk
MD5:4863FB43D0184E6285053630F338CD0D
SHA256:6620FA4923C028BB952C8257AF7229B6ABFCDEE783159257C77ED94EF2F37AD8
5712wscript.exeC:\ProgramData\Application Data.lnklnk
MD5:954966421A1ED7DA0E1194B60C845ED1
SHA256:58549EC29847A42413806B5B8A733CD5C911E00AB610E33109E84BADF538051B
5712wscript.exeC:\ProgramData\Microsoft.lnklnk
MD5:2037F0E2E5E5AEFA0193E477FF52B681
SHA256:28E23377A6F8CA62C8E620025B4F08B480116FF97CADF2092C798E99CB8CA65C
5712wscript.exeC:\ProgramData\Adobe.lnklnk
MD5:E31E2E67913410F5761C1DF5F710BD5B
SHA256:D9AF98A65FB9B4F74DC9B1A07B89F67C78D2A991ED9440F5D503741A4E2FD0AF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
23
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
2.20.245.137:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2668
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6800
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6800
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2940
svchost.exe
GET
200
2.23.197.184:80
http://x1.c.lencr.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5944
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1632
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
2.20.245.137:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
1268
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
2668
svchost.exe
20.190.159.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2668
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.78
whitelisted
crl.microsoft.com
  • 2.20.245.137
  • 2.20.245.139
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 23.35.229.160
whitelisted
login.live.com
  • 20.190.159.64
  • 40.126.31.69
  • 20.190.159.2
  • 40.126.31.131
  • 20.190.159.0
  • 40.126.31.73
  • 20.190.159.4
  • 20.190.159.131
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
nexusrules.officeapps.live.com
  • 52.111.243.30
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info