analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

competition##19730.vbs

Full analysis: https://app.any.run/tasks/818eb172-5189-4167-91c8-da389365fa26
Verdict: Malicious activity
Analysis date: October 14, 2019, 15:56:57
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines, with no line terminators
MD5:

1BCF3B5F9E30FFC34B8DAC170B63B033

SHA1:

07AE023FCC58E09BC6357DEE18D438BB92FC8688

SHA256:

E0AABAB141EDDC14F362DF325C42971C566BC0CB9FAA45AA28F69EA8BAE669D8

SSDEEP:

6144:dL2BSLUjCaebCMpUd32juE8TRrnrI87hjXlfGHDAgJbOXKtDlBAEbvHGgR8x8Ipg:rUgmFUTqg

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • IOhtkME.exe (PID: 1448)
      • IOhtkME.exe (PID: 3792)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WScript.exe (PID: 2448)
    • Executed via WMI

      • IOhtkME.exe (PID: 1448)
    • Creates files in the user directory

      • notepad++.exe (PID: 3404)
  • INFO

    • Manual execution by user

      • IOhtkME.exe (PID: 3792)
      • WScript.exe (PID: 2488)
      • explorer.exe (PID: 3036)
      • notepad++.exe (PID: 3404)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
7
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wscript.exe iohtkme.exe explorer.exe no specs iohtkme.exe notepad++.exe gup.exe wscript.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2448"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\competition##19730.vbs"C:\Windows\System32\WScript.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
1448C:\Users\admin\AppData\Local\Temp\IOhtkME.exeC:\Users\admin\AppData\Local\Temp\IOhtkME.exe
wmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft MIB-II subagent
Version:
6.1.7601.17514 (
3036"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3792"C:\Users\admin\AppData\Local\Temp\IOhtkME.exe" C:\Users\admin\AppData\Local\Temp\IOhtkME.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft MIB-II subagent
Version:
6.1.7601.17514 (
3404"C:\Program Files\Notepad++\notepad++.exe" "C:\Users\admin\AppData\Local\Temp\dRrvyyFJ"C:\Program Files\Notepad++\notepad++.exe
explorer.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Notepad++ : a free (GNU) source code editor
Exit code:
0
Version:
7.51
2244"C:\Program Files\Notepad++\updater\gup.exe" -v7.51C:\Program Files\Notepad++\updater\gup.exe
notepad++.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
GUP : a free (LGPL) Generic Updater
Exit code:
0
Version:
4.1
2488"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\competition##19730.vbs" C:\Windows\System32\WScript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Total events
523
Read events
503
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
2
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
2448WScript.exeC:\Users\admin\AppData\Local\Temp\fZfwiZrD.txt.zipcompressed
MD5:5A6C185883B117E8829481966587C117
SHA256:6E865733D3CCAD9DDC2BCDE504A3A8C9B684E5BAA93E07E5E8481920FC484246
2448WScript.exeC:\Users\admin\AppData\Local\Temp\fZfwiZrD.txtcompressed
MD5:5A6C185883B117E8829481966587C117
SHA256:6E865733D3CCAD9DDC2BCDE504A3A8C9B684E5BAA93E07E5E8481920FC484246
3404notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\session.xmltext
MD5:E6F67FE8CF6B0F178ACF38ED6BEC6960
SHA256:0CDACA409804AD7C248223E4977A32E245BEDD54CDAA840703E7BE9F3B919437
2448WScript.exeC:\Users\admin\AppData\Local\Temp\IOhtkME.exeexecutable
MD5:08BDF4E022B6AA1C5AEA135F352D0098
SHA256:BC026791E1BA7BF230294E1A2CDCF072F27A0A63CFCE39DFA1745CF4686E0B3C
3404notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\config.xmlxml
MD5:A49B81574B8340303AAEE81C6DE27B9D
SHA256:BDCD5858EF143FDCAD7A4E62ABB6FFB42936B8A8BCB55FC68DCEAC590731F868
2448WScript.exeC:\Users\admin\AppData\Local\Temp\dRrvyyFJtext
MD5:5FEC08995C62DC8B8F36C4B30FDF046B
SHA256:BE54F02C7312B363A2AD97DD5F8C370699B708C5B358A878D0ABCA5B711E48A8
3404notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\langs.xmlxml
MD5:E792264BEC29005B9044A435FBA185AB
SHA256:5298FD2F119C43D04F6CF831F379EC25B4156192278E40E458EC356F9B49D624
3404notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\plugins\Config\converter.initext
MD5:F70F579156C93B097E656CABA577A5C9
SHA256:B926498A19CA95DC28964B7336E5847107DD3C0F52C85195C135D9DD6CA402D4
3404notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\shortcuts.xmltext
MD5:AD21A64014891793DD9B21D835278F36
SHA256:C24699C9D00ABDD510140FE1B2ACE97BFC70D8B21BF3462DED85AFC4F73FE52F
3404notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\stylers.xmlxml
MD5:44982E1D48434C0AB3E8277E322DD1E4
SHA256:3E661D3F1FF3977B022A0ACC26B840B5E57D600BC03DCFC6BEFDB408C665904C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
3
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
95.101.72.151:80
http://isrg.trustid.ocsp.identrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUxKexpHsscfrb4UuQdf%2FEFWCFiRACEAoBQUIAAAFThXNqC4Xspwg%3D
unknown
der
1.37 Kb
whitelisted
GET
200
95.101.72.151:80
http://ocsp.int-x3.letsencrypt.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBR%2B5mrncpqz%2FPiiIGRsFqEtYHEIXQQUqEpqYwR93brm0Tm3pkVl7%2FOo7KECEgMpeSsuddjFyk25ZqSQ83ahjg%3D%3D
unknown
der
527 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2244
gup.exe
2.57.89.199:443
notepad-plus-plus.org
suspicious
95.101.72.151:80
isrg.trustid.ocsp.identrust.com
Akamai International B.V.
whitelisted

DNS requests

Domain
IP
Reputation
notepad-plus-plus.org
  • 2.57.89.199
whitelisted
isrg.trustid.ocsp.identrust.com
  • 95.101.72.151
  • 95.101.72.176
whitelisted
ocsp.int-x3.letsencrypt.org
  • 95.101.72.151
  • 95.101.72.191
whitelisted

Threats

No threats detected
Process
Message
IOhtkME.exe
Installing...
IOhtkME.exe
Installing...
IOhtkME.exe
Installing...
IOhtkME.exe
Installing...
IOhtkME.exe
Installing...
IOhtkME.exe
Installing...
IOhtkME.exe
Installing...
IOhtkME.exe
Installing...
IOhtkME.exe
Installing...
IOhtkME.exe
Installing...