ScreenShot
Created 2021.08.11 10:20 Machine s1_win7_x6402
Filename 222222.vbs
Type ASCII text, with CRLF line terminators
AI Score Not founds Behavior Score
10.0
ZERO API file : mailcious
VT API (file) 26 detected (Valyria, Save, Veanslim, Malscript, eienze, Pabo, NNI@8fded6, ai score=81, Donvibs, Outbreak, houdini)
md5 424085315ca9018d431fd693e72bfa64
sha256 bef413d426877a9f43dddd722cbd5b35905b57116820d2d93d5bea7ba4739483
ssdeep 48:5FGABpaDS1kzGIR0L6OhNrSA+g7rul3lnxl8H3C:5EABpaDSKzGIRo2A+gPul3lnxmXC
imphash
impfuzzy
  Network IP location

Signature (14cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
danger The process wscript.exe wrote an executable file to disk which it then attempted to execute
warning File has been identified by 26 AntiVirus engines on VirusTotal as malicious
watch Installs itself for autorun at Windows startup
watch Network communications indicative of a potential document or script payload download was initiated by the process wscript.exe
watch One or more non-whitelisted processes were created
watch Wscript.exe initiated network communications indicative of a script based payload download
watch wscript.exe-based dropper (JScript
notice A process created a hidden window
notice Connects to a Dynamic DNS Domain
notice Creates a suspicious process
notice Uses Windows utilities for basic Windows functionality
info Command line console output was observed
info Queries for the computername

Rules (0cnts)

Level Name Description Collection

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
facebook-sports.publicvm.com NL LeaseWeb Netherlands B.V. 81.171.31.214 mailcious
81.171.31.214 NL LeaseWeb Netherlands B.V. 81.171.31.214 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure