File name:

predator-blurayrip-ac3-5-1.torrent.vbe

Full analysis: https://app.any.run/tasks/edbde4c4-882d-4ac4-bd06-8038a4ca5aa6
Verdict: No threats detected
Analysis date: December 23, 2018, 16:06:22
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
autoit
Indicators:
MIME: application/octet-stream
File info: data
MD5:

A1B2A2AA8EED485D09673DE47E1858A1

SHA1:

C57B546BF2A12E670122D22A18D0BB60C5AB6F6B

SHA256:

B055CC17AD023F907B179678D04B9B8C06D8B43057B0F533D11572634A5BC469

SSDEEP:

24576:I4MUuMbIB1Os0UDDqFy6LSyHmxhWbeGDD2cJJoUvHM2cdFUWIwE4PEl:QbMU9Ju6EiGDD2FUGFawkl

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • vxcafmfvbx.exe (PID: 1520)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WScript.exe (PID: 2868)
    • Executes scripts

      • vxcafmfvbx.exe (PID: 1520)
    • Drop AutoIt3 executable file

      • WScript.exe (PID: 2868)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
31
Monitored processes
3
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start wscript.exe vxcafmfvbx.exe no specs vbc.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1520"C:\mklrcvnmwi__\vxcafmfvbx.exe" C:\mklrcvnmwi__\test.au3C:\mklrcvnmwi__\vxcafmfvbx.exeWScript.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 14, 2
Modules
Images
c:\mklrcvnmwi__\vxcafmfvbx.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
2868"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\predator-blurayrip-ac3-5-1.torrent.vbe"C:\Windows\System32\WScript.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3520"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exevxcafmfvbx.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual Basic Command Line Compiler
Exit code:
0
Version:
8.0.50727.5420
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\vbc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Total events
56
Read events
52
Write events
4
Delete events
0

Modification events

(PID) Process:(2868) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2868) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
1
Suspicious files
2
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
2868WScript.exeC:\mklrcvnmwi__\shell.txtbinary
MD5:
SHA256:
2868WScript.exeC:\mklrcvnmwi__\pe.bintext
MD5:
SHA256:
2868WScript.exeC:\mklrcvnmwi__\test.au3binary
MD5:
SHA256:
2868WScript.exeC:\mklrcvnmwi__\vxcafmfvbx.exeexecutable
MD5:B06E67F9767E5023892D9698703AD098
SHA256:8498900E57A490404E7EC4D8159BEE29AED5852AE88BD484141780EAADB727BB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info