File name:

mw.vbs

Full analysis: https://app.any.run/tasks/e0ccd07f-a4e0-4fb4-ae83-874f23044277
Verdict: Malicious activity
Analysis date: July 10, 2025, 07:05:07
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
susp-lnk
Indicators:
MIME: application/octet-stream
File info: data
MD5:

0A456FFFF1D3FD522457C187EBCF41E4

SHA1:

38D10544919BF3F1183BA6BF040E1CC3E156C3AE

SHA256:

3D929FBD23378F3246F6643F503E48AE8ECE5BDD8899E7DDF86568EBD044A2F2

SSDEEP:

192:93vF19G19+6SzeMr6u6dI4Ozl5B8BsdNN40yqlVHVex2XGVc:9N1Qi6SiMOtdI4OzlABsdr4RqlV1gWQc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Opens a text file (SCRIPT)

      • wscript.exe (PID: 5020)
      • wscript.exe (PID: 5712)
    • Gets path to any of the special folders (SCRIPT)

      • wscript.exe (PID: 5712)
      • wscript.exe (PID: 5020)
    • Gets a file object corresponding to the file in a specified path (SCRIPT)

      • wscript.exe (PID: 5020)
      • wscript.exe (PID: 5712)
    • Uses sleep, probably for evasion detection (SCRIPT)

      • wscript.exe (PID: 5712)
    • Modifies registry startup key (SCRIPT)

      • wscript.exe (PID: 5712)
    • Creates a new registry key or changes the value of an existing one (SCRIPT)

      • wscript.exe (PID: 5712)
  • SUSPICIOUS

    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 5020)
      • wscript.exe (PID: 5712)
    • Reads data from a binary Stream object (SCRIPT)

      • wscript.exe (PID: 5020)
    • Checks whether a specific file exists (SCRIPT)

      • wscript.exe (PID: 5020)
      • wscript.exe (PID: 5712)
    • Gets full path of the running script (SCRIPT)

      • wscript.exe (PID: 5020)
    • The process executes VB scripts

      • wscript.exe (PID: 5020)
    • Writes binary data to a Stream object (SCRIPT)

      • wscript.exe (PID: 5020)
      • wscript.exe (PID: 5712)
    • Application launched itself

      • wscript.exe (PID: 5020)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 5020)
    • Creates a Folder object (SCRIPT)

      • wscript.exe (PID: 5712)
    • Gets the drive type (SCRIPT)

      • wscript.exe (PID: 5712)
    • Gets a collection of all available drive names (SCRIPT)

      • wscript.exe (PID: 5712)
    • Creates file in the systems drive root

      • wscript.exe (PID: 5712)
    • Accesses computer name via WMI (SCRIPT)

      • wscript.exe (PID: 5712)
    • Accesses current user name via WMI (SCRIPT)

      • wscript.exe (PID: 5712)
    • Detected use of alternative data streams (AltDS)

      • wscript.exe (PID: 5712)
  • INFO

    • Creates files in the program directory

      • wscript.exe (PID: 5712)
    • Checks proxy server information

      • slui.exe (PID: 6268)
    • Reads the software policy settings

      • slui.exe (PID: 6268)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wscript.exe no specs wscript.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
5020"C:\WINDOWS\System32\WScript.exe" C:\Users\admin\AppData\Local\Temp\mw.vbsC:\Windows\System32\wscript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5712"C:\Windows\System32\wscript.exe" //e:VBScript C:\Users\admin\AppData\Local\Temp\rad5299E.tmp "C:\Users\admin\AppData\Local\Temp\mw.vbs"C:\Windows\System32\wscript.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6268C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
1 597
Read events
1 595
Write events
1
Delete events
1

Modification events

(PID) Process:(5712) wscript.exeKey:HKEY_CLASSES_ROOT\lnkfile
Operation:delete valueName:IsShortcut
Value:
(PID) Process:(5712) wscript.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Explorer
Value:
Wscript.exe //e:VBScript "C:\Users\admin\Documents\database.mdb"
Executable files
0
Suspicious files
18
Text files
2
Unknown types
67

Dropped files

PID
Process
Filename
Type
5020wscript.exeC:\Users\admin\AppData\Local\Temp\rad5299E.tmptext
MD5:977A2C8088B38E086137938079B25F43
SHA256:1B08C30E388C28E52F862A75230DC92C7338EE13B4CE3E606BF2A929ED349F52
5712wscript.exeC:\Users\admin\AppData\Local\Temp\auto.exebinary
MD5:0A456FFFF1D3FD522457C187EBCF41E4
SHA256:3D929FBD23378F3246F6643F503E48AE8ECE5BDD8899E7DDF86568EBD044A2F2
5712wscript.exeC:\ProgramData\Adobe.lnklnk
MD5:E31E2E67913410F5761C1DF5F710BD5B
SHA256:D9AF98A65FB9B4F74DC9B1A07B89F67C78D2A991ED9440F5D503741A4E2FD0AF
5712wscript.exeC:\Users\admin\AppData\Local\Temp\radE41BE.tmpbinary
MD5:0A456FFFF1D3FD522457C187EBCF41E4
SHA256:3D929FBD23378F3246F6643F503E48AE8ECE5BDD8899E7DDF86568EBD044A2F2
5712wscript.exeC:\ProgramData\Thumb.dbbinary
MD5:0A456FFFF1D3FD522457C187EBCF41E4
SHA256:3D929FBD23378F3246F6643F503E48AE8ECE5BDD8899E7DDF86568EBD044A2F2
5712wscript.exeC:\Users\admin\Documents\database.mdbbinary
MD5:0A456FFFF1D3FD522457C187EBCF41E4
SHA256:3D929FBD23378F3246F6643F503E48AE8ECE5BDD8899E7DDF86568EBD044A2F2
5712wscript.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\New Harry Potter and....lnklnk
MD5:4863FB43D0184E6285053630F338CD0D
SHA256:6620FA4923C028BB952C8257AF7229B6ABFCDEE783159257C77ED94EF2F37AD8
5712wscript.exeC:\Users\admin\AppData\Local\Temp\v.doctext
MD5:5F973C8004BE579518A85DFE2BCD56D7
SHA256:F48ED7892DD1743F121840D13CE017AABAEA41B121438ECA2FBF615352226A0A
5712wscript.exeC:\ProgramData\Desktop.lnklnk
MD5:4F4897FA02F656C4EA3BB1945619408B
SHA256:1AF3961B9D98A33A66043B037853C514410A74C107356E31AB15B12DB7368400
5712wscript.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\Microsoft.lnklnk
MD5:F168868BE8AEDCE15C401F13EF1440DC
SHA256:72992A0F31447D543E68AE8D45767FA81BFB5E4A1865C9AFAA78AE198B96B71E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
23
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
2.20.245.137:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6800
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6800
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2940
svchost.exe
GET
200
2.23.197.184:80
http://x1.c.lencr.org/
unknown
whitelisted
2668
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5944
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1632
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
2.20.245.137:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
1268
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
2668
svchost.exe
20.190.159.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2668
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.78
whitelisted
crl.microsoft.com
  • 2.20.245.137
  • 2.20.245.139
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 23.35.229.160
whitelisted
login.live.com
  • 20.190.159.64
  • 40.126.31.69
  • 20.190.159.2
  • 40.126.31.131
  • 20.190.159.0
  • 40.126.31.73
  • 20.190.159.4
  • 20.190.159.131
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
nexusrules.officeapps.live.com
  • 52.111.243.30
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info