File name:

VEFLSQM.vbs

Full analysis: https://app.any.run/tasks/0d623df1-7d95-40e8-b0d5-f9df7ed0e3ea
Verdict: Malicious activity
Analysis date: April 03, 2024, 14:55:16
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
MIME: text/plain
File info: Unicode text, UTF-8 text, with very long lines (43890), with CRLF line terminators
MD5:

151E1983C54690C9D6972D91CB5F5011

SHA1:

8E3240010AD9D33F9E41B26BA0B73B07E98468F0

SHA256:

A158E5ACD994A594C3B7EC9F7E89D93071CBAC81E39F9DB010128E46D344EE71

SSDEEP:

384:1LqGM+/YZb/rGcF70h+GTe9g+LvNeJLpJaItMEZav4j1pqEVEWUjfwqENdLHPlMo:lM+/4D6LRS8d+/q

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Creates internet connection object (SCRIPT)

      • wscript.exe (PID: 2580)
    • Gets a file object corresponding to the file in a specified path (SCRIPT)

      • wscript.exe (PID: 2580)
    • Opens a text file (SCRIPT)

      • wscript.exe (PID: 2580)
    • Gets startup folder path (SCRIPT)

      • wscript.exe (PID: 2580)
    • Checks whether a specified folder exists (SCRIPT)

      • wscript.exe (PID: 2580)
    • Gets TEMP folder path (SCRIPT)

      • wscript.exe (PID: 2580)
    • Copies file to a new location (SCRIPT)

      • wscript.exe (PID: 2580)
    • Gets path to any of the special folders (SCRIPT)

      • wscript.exe (PID: 2580)
    • Modifies registry startup key (SCRIPT)

      • wscript.exe (PID: 2580)
    • Creates a new registry key or changes the value of an existing one (SCRIPT)

      • wscript.exe (PID: 2580)
    • Accesses environment variables (SCRIPT)

      • wscript.exe (PID: 2580)
    • Gets username (SCRIPT)

      • wscript.exe (PID: 2580)
    • Uses sleep, probably for evasion detection (SCRIPT)

      • wscript.exe (PID: 2580)
    • Sends HTTP request (SCRIPT)

      • wscript.exe (PID: 2580)
    • Reads the value of a key from the registry (SCRIPT)

      • wscript.exe (PID: 2580)
    • Opens an HTTP connection (SCRIPT)

      • wscript.exe (PID: 2580)
  • SUSPICIOUS

    • Gets full path of the running script (SCRIPT)

      • wscript.exe (PID: 2580)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 2580)
    • Accesses OperatingSystem(Win32_OperatingSystem) via WMI (SCRIPT)

      • wscript.exe (PID: 2580)
    • Accesses operating system name via WMI (SCRIPT)

      • wscript.exe (PID: 2580)
    • Accesses WMI object caption (SCRIPT)

      • wscript.exe (PID: 2580)
    • Adds, changes, or deletes HTTP request header (SCRIPT)

      • wscript.exe (PID: 2580)
    • Reads the Internet Settings

      • wscript.exe (PID: 2580)
    • Executes WMI query (SCRIPT)

      • wscript.exe (PID: 2580)
    • Accesses WMI object, sets custom ImpersonationLevel (SCRIPT)

      • wscript.exe (PID: 2580)
    • Accesses local storage devices (Win32_LogicalDisk) via WMI (SCRIPT)

      • wscript.exe (PID: 2580)
    • Accesses current user name via WMI (SCRIPT)

      • wscript.exe (PID: 2580)
    • Gets computer name (SCRIPT)

      • wscript.exe (PID: 2580)
    • Accesses computer name via WMI (SCRIPT)

      • wscript.exe (PID: 2580)
    • Gets disk free space (SCRIPT)

      • wscript.exe (PID: 2580)
    • Gets the drive type (SCRIPT)

      • wscript.exe (PID: 2580)
    • Checks whether the drive is ready (SCRIPT)

      • wscript.exe (PID: 2580)
    • Gets a collection of all available drive names (SCRIPT)

      • wscript.exe (PID: 2580)
  • INFO

    • Checks proxy server information

      • wscript.exe (PID: 2580)
    • Checks supported languages

      • wmpnscfg.exe (PID: 796)
    • Reads the computer name

      • wmpnscfg.exe (PID: 796)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 796)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wscript.exe no specs wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
796"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2580"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\VEFLSQM.vbs"C:\Windows\System32\wscript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
1 762
Read events
1 696
Write events
54
Delete events
12

Modification events

(PID) Process:(2580) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:VEFLSQM
Value:
wscript.exe //B //E:vbs "C:\Users\admin\AppData\Local\Temp\VEFLSQM.vbs"
(PID) Process:(2580) wscript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:VEFLSQM
Value:
wscript.exe //B //E:vbs "C:\Users\admin\AppData\Local\Temp\VEFLSQM.vbs"
(PID) Process:(2580) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2580) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2580) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2580) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2580) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2580) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyServer
Value:
(PID) Process:(2580) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyOverride
Value:
(PID) Process:(2580) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoConfigURL
Value:
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
25
DNS requests
1
Threats
1

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
224.0.0.252:5355
unknown
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

Domain
IP
Reputation
xn8n8.sytes.net
  • 0.0.0.0
unknown

Threats

PID
Process
Class
Message
1080
svchost.exe
Potentially Bad Traffic
ET INFO DYNAMIC_DNS Query to a *.sytes.net Domain
No debug info