Report - Funds_589281.wsf

ScreenShot
Created 2023.04.19 09:04 Machine s1_win7_x6402
Filename Funds_589281.wsf
Type UTF-8 Unicode text, with very long lines, with CRLF, LF line terminators
AI Score Not founds Behavior Score
10.0
ZERO API file : clean
VT API (file)
md5 3d90344c5976a644b6e482e9a325d9cb
sha256 b500b400ad724bf0a5415d5bbc53e77f2a06cbdebe3210654f10e2c52006667a
ssdeep 1536:gjVCfQtg3YiaC8m4TijEDgK+xalolRrZs8dvgfTGK0rbf3DbXrX:gjcE2xMm4UEd4V++vgfTT0rbbbXb
imphash
impfuzzy
  Network IP location

Signature (12cnts)

Level Description
danger A potential heapspray has been detected. 3328 megabytes was sprayed onto the heap of the wscript.exe process
danger The process wscript.exe wrote an executable file to disk which it then attempted to execute
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
watch Communicates with host for which no DNS query was performed
watch Network communications indicative of a potential document or script payload download was initiated by the process wscript.exe
watch One or more non-whitelisted processes were created
watch Wscript.exe initiated network communications indicative of a script based payload download
watch wscript.exe-based dropper (JScript
notice Allocates read-write-execute memory (usually to unpack itself)
notice Performs some HTTP requests
info Checks amount of memory in system
info One or more processes crashed

Rules (0cnts)

Level Name Description Collection

Network (5cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
https://pastebin.com/raw/zD5ag0UX US CLOUDFLARENET 172.67.34.170 mailcious
https://pastebin.com/raw/mJfkXNYx US CLOUDFLARENET 172.67.34.170 clean
pastebin.com US CLOUDFLARENET 104.20.68.143 mailcious
216.120.201.169 US TRIVALENT-GROUP-NEW 216.120.201.169 mailcious
172.67.34.170 US CLOUDFLARENET 172.67.34.170 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure