File name:

Microsoft Word.WsF

Full analysis: https://app.any.run/tasks/87b4bfa9-d423-47cd-a867-47465118b1b8
Verdict: Malicious activity
Analysis date: December 30, 2018, 10:46:44
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/html
File info: HTML document, ASCII text, with very long lines, with CRLF line terminators
MD5:

1D49B3390B1A8E565EBAAF19A99D0244

SHA1:

FC775802117A90835292B13C14C18A9C6D10E04C

SHA256:

78ACBDBB2DCF29926BD6E0981B2ECB5C082464D53041D9D1ADFF2DEACB89BB1F

SSDEEP:

3072:DCRyUssx4MU6jildoRfC/FildPild784anNlcNH:GM

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • wscript.exe (PID: 3628)
      • WScript.exe (PID: 3068)
  • SUSPICIOUS

    • Creates files in the user directory

      • WScript.exe (PID: 3068)
    • Application launched itself

      • WScript.exe (PID: 3068)
    • Connects to unusual port

      • wscript.exe (PID: 3628)
    • Executes scripts

      • WScript.exe (PID: 3068)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wscript.exe wscript.exe

Process information

PID
CMD
Path
Indicators
Parent process
3068"C:\Windows\System32\WScript.exe" "C:\Users\admin\Desktop\Microsoft Word.WsF"C:\Windows\System32\WScript.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3628"C:\Windows\System32\wscript.exe" //D "C:\Users\admin\AppData\Roaming\Microsoft Office\\Microsoft Word.WsF"C:\Windows\System32\wscript.exe
WScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
276
Read events
245
Write events
31
Delete events
0

Modification events

(PID) Process:(3068) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft Word
Operation:writeName:
Value:
FaLsE - 12/30/2018
(PID) Process:(3068) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Microsoft Word
Value:
wscript.exe //B "C:\Users\admin\AppData\Roaming\Microsoft Office\\Microsoft Word.WsF"
(PID) Process:(3068) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Microsoft Word
Value:
wscript.exe //B "C:\Users\admin\AppData\Roaming\Microsoft Office\\Microsoft Word.WsF"
(PID) Process:(3068) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3068) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3628) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Microsoft Word
Value:
wscript.exe //B "C:\Users\admin\AppData\Roaming\Microsoft Office\\Microsoft Word.WsF"
(PID) Process:(3628) wscript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Microsoft Word
Value:
wscript.exe //B "C:\Users\admin\AppData\Roaming\Microsoft Office\\Microsoft Word.WsF"
(PID) Process:(3628) wscript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3628) wscript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3628) wscript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
Executable files
0
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
3068WScript.exeC:\Users\admin\AppData\Roaming\Microsoft Office\Microsoft Word.WsFhtml
MD5:1D49B3390B1A8E565EBAAF19A99D0244
SHA256:78ACBDBB2DCF29926BD6E0981B2ECB5C082464D53041D9D1ADFF2DEACB89BB1F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
6
Threats
2

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3628
wscript.exe
105.98.61.219:860
maroco.linkpc.net
Telecom Algeria
DZ
malicious
3628
wscript.exe
197.200.87.247:860
maroco.myq-see.com
Telecom Algeria
DZ
unknown

DNS requests

Domain
IP
Reputation
maroco.linkpc.net
  • 105.98.61.219
malicious
dns.msftncsi.com
  • 131.107.255.255
shared
maroco.myq-see.com
  • 197.200.87.247
malicious

Threats

PID
Process
Class
Message
1056
svchost.exe
Potential Corporate Privacy Violation
ET INFO Observed DNS Query to .myq-see .com DDNS Domain
1 ETPRO signatures available at the full report
No debug info