File name:

Hellboy.La_espada_de_las_tormentas[DVDrip][Spanish].vbs

Full analysis: https://app.any.run/tasks/7a2d85f7-7780-4061-94dd-7be21e432f35
Verdict: No threats detected
Analysis date: September 12, 2019, 11:14:38
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
autoit
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines, with CRLF line terminators
MD5:

B349A1F618CA6F5A3929036ECBF82092

SHA1:

5B6766C9F9EB6B12E4FD508CAE447B6EFA86932A

SHA256:

93E00AC9D5EE195274700F6B072E05F5AB61F63F298F56C6F1B2C4F7FE099AB1

SSDEEP:

24576:Cf8b/kehPHRL2dB7hdCPSQNVAYjDZyX6w4eTWle9Qm65Gio2HbaD+zSaor78phSQ:Cfkki6QaVmt728pV

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • pjgqcubj.exe (PID: 2872)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WScript.exe (PID: 3612)
    • Drop AutoIt3 executable file

      • WScript.exe (PID: 3612)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
34
Monitored processes
3
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start wscript.exe pjgqcubj.exe no specs notepad.exe

Process information

PID
CMD
Path
Indicators
Parent process
2404"C:\Windows\system32\notepad.exe"C:\Windows\system32\notepad.exe
pjgqcubj.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2872"C:\sckxgrst\pjgqcubj.exe" ghwcifvf.au3C:\sckxgrst\pjgqcubj.exeWScript.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script (Beta)
Exit code:
0
Version:
3, 3, 15, 1
Modules
Images
c:\sckxgrst\pjgqcubj.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
3612"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\Hellboy.La_espada_de_las_tormentas[DVDrip][Spanish].vbs"C:\Windows\System32\WScript.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
63
Read events
59
Write events
4
Delete events
0

Modification events

(PID) Process:(3612) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3612) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
1
Suspicious files
1
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
3612WScript.exeC:\sckxgrst\ghwcifvf.au3binary
MD5:
SHA256:
3612WScript.exeC:\sckxgrst\pe.bintext
MD5:
SHA256:
3612WScript.exeC:\Users\admin\AppData\Local\Temp\test.txttext
MD5:
SHA256:
3612WScript.exeC:\sckxgrst\pjgqcubj.exeexecutable
MD5:3F58A517F1F4796225137E7659AD2ADB
SHA256:1DA298CAB4D537B0B7B5DABF09BFF6A212B9E45731E0CC772F99026005FB9E48
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
7
DNS requests
1
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2404
notepad.exe
POST
104.26.5.86:80
http://www.mejortorrentt.org/uploads/torrents/series/Hellboy.torrent
US
malicious
2404
notepad.exe
POST
104.26.5.86:80
http://www.mejortorrentt.org/uploads/torrents/juegos/Hellboy.torrent
US
malicious
2404
notepad.exe
POST
104.26.5.86:80
http://www.mejortorrentt.org/uploads/torrents/musica/Hellboy.torrent
US
malicious
2404
notepad.exe
POST
104.26.5.86:80
http://www.mejortorrentt.org/1
US
malicious
2404
notepad.exe
POST
104.26.5.86:80
http://www.mejortorrentt.org/uploads/torrents/documentales/Hellboy.torrent
US
malicious
2404
notepad.exe
POST
104.26.5.86:80
http://www.mejortorrentt.org/uploads/torrents/variados/Hellboy.torrent
US
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2404
notepad.exe
104.26.5.86:80
www.mejortorrentt.org
Cloudflare Inc
US
shared

DNS requests

Domain
IP
Reputation
www.mejortorrentt.org
  • 104.26.5.86
  • 104.26.4.86
malicious

Threats

PID
Process
Class
Message
2404
notepad.exe
Potential Corporate Privacy Violation
ET P2P possible torrent download
2404
notepad.exe
Potential Corporate Privacy Violation
ET P2P possible torrent download
2404
notepad.exe
Potential Corporate Privacy Violation
ET P2P possible torrent download
2404
notepad.exe
Potential Corporate Privacy Violation
ET P2P possible torrent download
2404
notepad.exe
Potential Corporate Privacy Violation
ET P2P possible torrent download
No debug info