File name:

sample3.vbs

Full analysis: https://app.any.run/tasks/07cbae6d-32e6-4fbf-877b-43e334765eff
Verdict: Malicious activity
Analysis date: May 20, 2019, 14:35:51
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines
MD5:

97060F341569949E79FBF6B0DADCCAFD

SHA1:

EAA2F5798C8429DBC2487F82EB6F560582570E47

SHA256:

CF4BE8F48B0C3A48F0BEC9C31AC060961C2D664889D4983E3091CFD63CABAA12

SSDEEP:

1536:IDQZoVRKqJubUkUzsy4dtNG4cWQ640hV6+PmafUcnsed:JZoJu7asy4dz6WpDP82r

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Writes to a start menu file

      • WScript.exe (PID: 3384)
      • wscript.exe (PID: 3816)
      • wscript.exe (PID: 2376)
    • Changes the autorun value in the registry

      • WScript.exe (PID: 3384)
      • wscript.exe (PID: 2376)
      • wscript.exe (PID: 3816)
  • SUSPICIOUS

    • Creates files in the user directory

      • WScript.exe (PID: 3384)
      • wscript.exe (PID: 2376)
    • Application launched itself

      • WScript.exe (PID: 3384)
      • wscript.exe (PID: 3816)
    • Executes scripts

      • WScript.exe (PID: 3384)
      • wscript.exe (PID: 3816)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wscript.exe wscript.exe wscript.exe wscript.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2376"C:\Windows\System32\wscript.exe" //B "C:\Users\admin\AppData\Roaming\eVLBexZRWe.vbs"C:\Windows\System32\wscript.exe
WScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2988"C:\Windows\System32\wscript.exe" //B "C:\Users\admin\AppData\Roaming\eVLBexZRWe.vbs"C:\Windows\System32\wscript.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
1
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3384"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\sample3.vbs"C:\Windows\System32\WScript.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3816"C:\Windows\System32\wscript.exe" //B "C:\Users\admin\AppData\Roaming\sample3.vbs"C:\Windows\System32\wscript.exe
WScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
555
Read events
405
Write events
150
Delete events
0

Modification events

(PID) Process:(3384) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3384) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2376) wscript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\EVLBEXZRWE
Operation:writeName:
Value:
false - 5/20/2019
(PID) Process:(2376) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:eVLBexZRWe
Value:
wscript.exe //B "C:\Users\admin\AppData\Roaming\eVLBexZRWe.vbs"
(PID) Process:(2376) wscript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:eVLBexZRWe
Value:
wscript.exe //B "C:\Users\admin\AppData\Roaming\eVLBexZRWe.vbs"
(PID) Process:(3384) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\sample3
Operation:writeName:
Value:
false - 5/20/2019
(PID) Process:(3384) WScript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:sample3
Value:
wscript.exe //B "C:\Users\admin\AppData\Roaming\sample3.vbs"
(PID) Process:(3384) WScript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:sample3
Value:
wscript.exe //B "C:\Users\admin\AppData\Roaming\sample3.vbs"
(PID) Process:(3816) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3816) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
0
Suspicious files
0
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
3384WScript.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sample3.vbstext
MD5:
SHA256:
3384WScript.exeC:\Users\admin\AppData\Roaming\eVLBexZRWe.vbstext
MD5:
SHA256:
3816wscript.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sample3.vbstext
MD5:
SHA256:
3816wscript.exeC:\Users\admin\AppData\Roaming\eVLBexZRWe.vbstext
MD5:
SHA256:
3384WScript.exeC:\Users\admin\AppData\Roaming\sample3.vbstext
MD5:
SHA256:
2376wscript.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eVLBexZRWe.vbstext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
57
DNS requests
2
Threats
1

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2376
wscript.exe
23.105.131.225:3456
savelifes.tech
Nobis Technology Group, LLC
US
malicious
3816
wscript.exe
178.239.21.62:1065
kingshakes.linkpc.net
Telekomunikacije Republike Srpske akcionarsko drustvo Banja Luka
BA
unknown

DNS requests

Domain
IP
Reputation
kingshakes.linkpc.net
  • 178.239.21.62
malicious
savelifes.tech
  • 23.105.131.225
malicious

Threats

Found threats are available for the paid subscriptions
1 ETPRO signatures available at the full report
No debug info