File name: | Video.vbE |
Full analysis: | https://app.any.run/tasks/99f3c00b-3644-4f5b-9f80-2c906b5f6be4 |
Verdict: | Malicious activity |
Analysis date: | December 05, 2022, 17:51:33 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/octet-stream |
File info: | data |
MD5: | 3FE8A21E02ACBE1475CCFD15A0786713 |
SHA1: | B7BB1A6DA3DA2965E3D7CB4A24985A99C9335F11 |
SHA256: | 87794B47A262499A58C4949907CB8F917DF72853E0F4B0B926892F6AAD23B510 |
SSDEEP: | 3072:uYJ5hdv2zVvNhmO+54wQqMP3Pml0prpWEt6uvw2Cg:uYJ5h52zVFhmO+tQqeml0pNWO |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2560 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\Video.vbE" | C:\Windows\System32\WScript.exe | Explorer.EXE | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Version: 5.8.7600.16385 Modules
|
(PID) Process: | (2560) WScript.exe | Key: | HKEY_CURRENT_USER |
Operation: | write | Name: | Format Factory |
Value: False - 12/5/2022 | |||
(PID) Process: | (2560) WScript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
Operation: | write | Name: | Format Factory |
Value: Cmd.exe /c start WScript.exe /e:VBScript.Encode C:\Users\admin\AppData\Roaming\Video.3gp | |||
(PID) Process: | (2560) WScript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
Operation: | write | Name: | Format Factory |
Value: Cmd.exe /c start WScript.exe /e:VBScript.Encode C:\Users\admin\AppData\Roaming\Video.3gp | |||
(PID) Process: | (2560) WScript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
(PID) Process: | (2560) WScript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | IntranetName |
Value: 1 | |||
(PID) Process: | (2560) WScript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
(PID) Process: | (2560) WScript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 0 | |||
(PID) Process: | (2560) WScript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
(PID) Process: | (2560) WScript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
Operation: | write | Name: | SavedLegacySettings |
Value: 460000003B010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A80164000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
(PID) Process: | (2560) WScript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
Operation: | write | Name: | CachePrefix |
Value: |
PID | Process | Filename | Type | |
---|---|---|---|---|
2560 | WScript.exe | C:\Users\admin\AppData\Roaming\Video.3gp | binary | |
MD5:3FE8A21E02ACBE1475CCFD15A0786713 | SHA256:87794B47A262499A58C4949907CB8F917DF72853E0F4B0B926892F6AAD23B510 | |||
2560 | WScript.exe | C:\Users\admin\AppData\Local\Temp\temp\VIDEO\Video.3gp | binary | |
MD5:3FE8A21E02ACBE1475CCFD15A0786713 | SHA256:87794B47A262499A58C4949907CB8F917DF72853E0F4B0B926892F6AAD23B510 | |||
2560 | WScript.exe | C:\Users\admin\AppData\Local\Temp\temp\XNXX\Video.3gp | binary | |
MD5:3FE8A21E02ACBE1475CCFD15A0786713 | SHA256:87794B47A262499A58C4949907CB8F917DF72853E0F4B0B926892F6AAD23B510 | |||
2560 | WScript.exe | C:\Users\admin\AppData\Local\Temp\temp\MUSIC\Music_Rai.Mp3.lnk | lnk | |
MD5:6B05D7918C585B764772E74076CC64BE | SHA256:EEDB844402AD4F7166C971793EA19AF376C6099199D3B4559F3F492A9EBC7C9F | |||
2560 | WScript.exe | C:\Users\admin\AppData\Local\Temp\temp\MUSIC\Video.3gp | binary | |
MD5:3FE8A21E02ACBE1475CCFD15A0786713 | SHA256:87794B47A262499A58C4949907CB8F917DF72853E0F4B0B926892F6AAD23B510 | |||
2560 | WScript.exe | C:\Users\admin\AppData\Local\Temp\temp\Film\Video.3gp | binary | |
MD5:3FE8A21E02ACBE1475CCFD15A0786713 | SHA256:87794B47A262499A58C4949907CB8F917DF72853E0F4B0B926892F6AAD23B510 | |||
2560 | WScript.exe | C:\Users\admin\AppData\Local\Temp\temp\DCIM\IMG_04315.jpg.lnk | lnk | |
MD5:6B05D7918C585B764772E74076CC64BE | SHA256:EEDB844402AD4F7166C971793EA19AF376C6099199D3B4559F3F492A9EBC7C9F | |||
2560 | WScript.exe | C:\Users\admin\AppData\Local\Temp\temp\XNXX\Play_Video.Mp4.lnk | lnk | |
MD5:6B05D7918C585B764772E74076CC64BE | SHA256:EEDB844402AD4F7166C971793EA19AF376C6099199D3B4559F3F492A9EBC7C9F | |||
2560 | WScript.exe | C:\Users\admin\AppData\Local\Temp\temp\DCIM\Video.3gp | binary | |
MD5:3FE8A21E02ACBE1475CCFD15A0786713 | SHA256:87794B47A262499A58C4949907CB8F917DF72853E0F4B0B926892F6AAD23B510 | |||
2560 | WScript.exe | C:\Users\admin\AppData\Local\Temp\temp\VIDEO\1_YouTube.Flv.lnk | lnk | |
MD5:6B05D7918C585B764772E74076CC64BE | SHA256:EEDB844402AD4F7166C971793EA19AF376C6099199D3B4559F3F492A9EBC7C9F |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2560 | WScript.exe | 38.79.142.69:1104 | mr-wolf.linkpc.net | UTL-42-36113 | US | unknown |
Domain | IP | Reputation |
---|---|---|
mr-wolf.redirectme.net |
| unknown |
mr-wolf.myq-see.com |
| unknown |
mr-wolf.linkpc.net |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
— | — | A Network Trojan was detected | AV TROJAN Observed DNS Query to Suspicious Domain (mr-wolf[.]redirectme[.]net) |
— | — | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.redirectme .net |
— | — | A Network Trojan was detected | AV TROJAN Observed DNS Query to Suspicious Domain (mr-wolf[.]redirectme[.]net) |
— | — | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.redirectme .net |
— | — | Potential Corporate Privacy Violation | ET INFO Observed DNS Query to .myq-see .com DDNS Domain |
— | — | A Network Trojan was detected | AV TROJAN Observed DNS Query to Suspicious Domain (mr-wolf[.]myq-see[.]com) |
— | — | A Network Trojan was detected | AV TROJAN Observed DNS Query to Suspicious Domain (mr-wolf[.]linkpc[.]net) |
— | — | Potentially Bad Traffic | ET INFO Observed DNS Query to DynDNS Domain (linkpc .net) |
— | — | Potential Corporate Privacy Violation | ET INFO Observed DNS Query to .myq-see .com DDNS Domain |
— | — | A Network Trojan was detected | AV TROJAN Observed DNS Query to Suspicious Domain (mr-wolf[.]myq-see[.]com) |