analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

DEVOLUCI__N DE DINERO EN CUENTA.VBS

Full analysis: https://app.any.run/tasks/14186ff5-c3c3-41a3-8bf9-789b460f86a8
Verdict: Malicious activity
Analysis date: July 18, 2019, 02:36:53
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/plain
File info: Little-endian UTF-16 Unicode text, with very long lines, with CRLF line terminators
MD5:

735EE1FFC7CC1A0A3BA7A6CD464E5A4F

SHA1:

F4B281D444D114A880BE92B67CB808D762E6B9EB

SHA256:

5AAFBCFA117DFF0EBB578555F9B946566FF848DD43184089DA6A970EFDA2BE98

SSDEEP:

192:dlQf3s2EWi8+jJnnqH33Uo6fKixfiEOxWGFH5xsm8mOIGJ+StP2Xc9+rVLaVIRb+:L

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Writes to a start menu file

      • WScript.exe (PID: 3424)
      • wscript.exe (PID: 3488)
    • Changes the autorun value in the registry

      • WScript.exe (PID: 3424)
      • wscript.exe (PID: 3488)
  • SUSPICIOUS

    • Creates files in the user directory

      • WScript.exe (PID: 3424)
    • Application launched itself

      • WScript.exe (PID: 3424)
    • Executes scripts

      • WScript.exe (PID: 3424)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.txt | Text - UTF-16 (LE) encoded (66.6)
.mp3 | MP3 audio (33.3)
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wscript.exe wscript.exe

Process information

PID
CMD
Path
Indicators
Parent process
3424"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\DEVOLUCI__N DE DINERO EN CUENTA.VBS"C:\Windows\System32\WScript.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
3488"C:\Windows\System32\wscript.exe" //B "C:\Users\admin\AppData\Roaming\DEVOLUCI__N DE DINERO EN CUENTA.VBS"C:\Windows\System32\wscript.exe
WScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Version:
5.8.7600.16385
Total events
315
Read events
240
Write events
75
Delete events
0

Modification events

(PID) Process:(3424) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\DEVOLUCI__N DE DINERO EN CUENTA
Operation:writeName:
Value:
false - 7/18/2019
(PID) Process:(3424) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:DEVOLUCI__N DE DINERO EN CUENTA
Value:
wscript.exe //B "C:\Users\admin\AppData\Roaming\DEVOLUCI__N DE DINERO EN CUENTA.VBS"
(PID) Process:(3424) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:DEVOLUCI__N DE DINERO EN CUENTA
Value:
wscript.exe //B "C:\Users\admin\AppData\Roaming\DEVOLUCI__N DE DINERO EN CUENTA.VBS"
(PID) Process:(3424) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3424) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3488) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:DEVOLUCI__N DE DINERO EN CUENTA
Value:
wscript.exe //B "C:\Users\admin\AppData\Roaming\DEVOLUCI__N DE DINERO EN CUENTA.VBS"
(PID) Process:(3488) wscript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:DEVOLUCI__N DE DINERO EN CUENTA
Value:
wscript.exe //B "C:\Users\admin\AppData\Roaming\DEVOLUCI__N DE DINERO EN CUENTA.VBS"
(PID) Process:(3488) wscript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3488) wscript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3488) wscript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
Executable files
0
Suspicious files
0
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
3424WScript.exeC:\Users\admin\AppData\Roaming\DEVOLUCI__N DE DINERO EN CUENTA.VBStext
MD5:735EE1FFC7CC1A0A3BA7A6CD464E5A4F
SHA256:5AAFBCFA117DFF0EBB578555F9B946566FF848DD43184089DA6A970EFDA2BE98
3488wscript.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DEVOLUCI__N DE DINERO EN CUENTA.VBStext
MD5:735EE1FFC7CC1A0A3BA7A6CD464E5A4F
SHA256:5AAFBCFA117DFF0EBB578555F9B946566FF848DD43184089DA6A970EFDA2BE98
3424WScript.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DEVOLUCI__N DE DINERO EN CUENTA.VBStext
MD5:735EE1FFC7CC1A0A3BA7A6CD464E5A4F
SHA256:5AAFBCFA117DFF0EBB578555F9B946566FF848DD43184089DA6A970EFDA2BE98
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

Domain
IP
Reputation
blockchan.dynu.net
malicious

Threats

No threats detected
No debug info