File name:

REFERENCIA CATASTRAL 010101580031000 ORDEN DE EMBARGO DE CUENTAS BANCARIAS.vbs

Full analysis: https://app.any.run/tasks/ca141c8c-4caf-4091-b9d8-2d9d76aff0a4
Verdict: Malicious activity
Analysis date: January 28, 2025, 14:17:40
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: text/plain
File info: Unicode text, UTF-8 text, with very long lines (12047), with CRLF line terminators
MD5:

0A4AC1A197D09EE90BD76F0363152DB2

SHA1:

AF7EC1ECA4552B2215975E6946BEB96223FC02DD

SHA256:

914703C73590C3F324B260A1EC1F301EA0DD7E562B14D3177E8BED4B954C44ED

SSDEEP:

3072:QyGVmI3b0mgfmWu+Ie9VOv5iG5sVhQ30Wk+70wgA11:QyGV/e9VOvp

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Gets full path of the running script (SCRIPT)

      • wscript.exe (PID: 5316)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 5316)
    • Executes application which crashes

      • wscript.exe (PID: 5316)
    • The process creates files with name similar to system file names

      • WerFault.exe (PID: 3040)
  • INFO

    • Reads security settings of Internet Explorer

      • OpenWith.exe (PID: 3992)
      • notepad.exe (PID: 6644)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 3992)
    • Manual execution by a user

      • wscript.exe (PID: 5316)
    • Checks proxy server information

      • WerFault.exe (PID: 3040)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 3040)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start openwith.exe no specs notepad.exe no specs wscript.exe werfault.exe

Process information

PID
CMD
Path
Indicators
Parent process
3040C:\WINDOWS\system32\WerFault.exe -u -p 5316 -s 800C:\Windows\System32\WerFault.exe
wscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
3992"C:\WINDOWS\System32\OpenWith.exe" "C:\Users\admin\Desktop\REFERENCIA CATASTRAL 010101580031000 ORDEN DE EMBARGO DE CUENTAS BANCARIAS.vbs.vba"C:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
5316"C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\Desktop\REFERENCIA CATASTRAL 010101580031000 ORDEN DE EMBARGO DE CUENTAS BANCARIAS.vbs" C:\Windows\System32\wscript.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
3221225477
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6644"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\REFERENCIA CATASTRAL 010101580031000 ORDEN DE EMBARGO DE CUENTAS BANCARIAS.vbs.vbaC:\Windows\System32\notepad.exeOpenWith.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
Total events
4 414
Read events
4 414
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
7
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
3040WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_WScript.exe_ade32fc73311ebbd7b022c76e9473a611bd78b6_debcac4a_8d2a4538-f5c3-42bd-8c8e-43fce5ba5a0f\Report.wer
MD5:
SHA256:
3040WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FEbinary
MD5:FA84E4BCC92AA5DB735AB50711040CDE
SHA256:6D7205E794FDE4219A62D9692ECDDF612663A5CF20399E79BE87B851FCA4CA33
3040WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WEREA73.tmp.dmpbinary
MD5:2A4A00A54E574BF91FA41F63A3C3858B
SHA256:804E055763C28E18F853F4D5117717DEF66420F16F11AF06D9FA20AFDC2B6281
3040WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:1978C1E7CB275971D8EBE842B4EA79C7
SHA256:AA90E0D72FA93716BADA06967B5AACBF3DEE92F1D3C6871F05084A85EF6916A2
3040WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\wscript.exe.5316.dmpbinary
MD5:AA616497FE179AECA1F6CA0D44D501AD
SHA256:27A9D5DB4BE569AE9EBC36B10DD43B8EE798E30F49E584164655495333C53CE5
3040WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785binary
MD5:680B0331A3CC8FCCE16367586EC7A721
SHA256:19F1B5D2C7F62663C14D97578411DC610E5F33E6CE4165977314442435F15305
3040WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WEREB7D.tmp.WERInternalMetadata.xmlbinary
MD5:05CC888DD39BD44ED887D34BD1A6EB29
SHA256:7872F63BB50A7F00087E39CECB1CA234D07646C4A0CAF27AF72D5C79DB499F78
3040WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785binary
MD5:71F21C6A50F7FBB4AE0081B832ECD24E
SHA256:D18BAC3EB441DA956EB742B6195833268C850852A212CB0B63363E64793FC6B1
3040WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WEREBBD.tmp.xmlxml
MD5:58D3AA4F650A0AB0109DAC3ACBFDE51B
SHA256:789C5FC3CA6255E44D7A23FB8C4679549D48490076DBC3B87E1E3A61DB73D8AF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
27
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7040
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7040
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6728
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
3040
WerFault.exe
GET
200
23.48.23.179:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3040
WerFault.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
92.123.104.58:443
Akamai International B.V.
DE
unknown
640
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
40.126.32.72:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1076
svchost.exe
23.35.238.131:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:137
whitelisted
7040
SIHClient.exe
52.149.20.212:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7040
SIHClient.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
login.live.com
  • 40.126.32.72
  • 20.190.160.20
  • 40.126.32.134
  • 40.126.32.133
  • 20.190.160.17
  • 40.126.32.74
  • 40.126.32.140
  • 40.126.32.76
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
arc.msn.com
  • 20.199.58.43
whitelisted
fd.api.iris.microsoft.com
  • 20.31.169.57
whitelisted
watson.events.data.microsoft.com
  • 13.89.179.12
whitelisted
crl.microsoft.com
  • 23.48.23.179
  • 23.48.23.178
  • 23.48.23.180
  • 23.48.23.185
  • 23.48.23.175
  • 23.48.23.172
  • 23.48.23.170
  • 23.48.23.157
  • 23.48.23.160
whitelisted

Threats

No threats detected
No debug info