Report - Funds_366728.wsf

ScreenShot
Created 2023.04.19 09:04 Machine s1_win7_x6403
Filename Funds_366728.wsf
Type UTF-8 Unicode text, with very long lines, with CRLF, LF line terminators
AI Score Not founds Behavior Score
10.0
ZERO API file : clean
VT API (file)
md5 dc0ded1a1a05a26960a9adbf3cc5e5cb
sha256 f6003d3caef914e6631d1bee88790711b32a8503d763af909efcf4edf2516f77
ssdeep 1536:KWjV5HcO+sdf2lKwbX5TcVvQaTDBgZkR4P8CmyeKDK:KWoOzdf2lKwb5AVjFCmKDK
imphash
impfuzzy
  Network IP location

Signature (12cnts)

Level Description
danger A potential heapspray has been detected. 3579 megabytes was sprayed onto the heap of the wscript.exe process
danger The process wscript.exe wrote an executable file to disk which it then attempted to execute
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
watch Attempts to create or modify system certificates
watch Communicates with host for which no DNS query was performed
watch Network communications indicative of a potential document or script payload download was initiated by the process wscript.exe
watch One or more non-whitelisted processes were created
watch Wscript.exe initiated network communications indicative of a script based payload download
watch wscript.exe-based dropper (JScript
notice Allocates read-write-execute memory (usually to unpack itself)
notice Performs some HTTP requests
info One or more processes crashed

Rules (0cnts)

Level Name Description Collection

Network (5cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
https://pastebin.com/raw/zD5ag0UX US CLOUDFLARENET 104.20.68.143 mailcious
https://pastebin.com/raw/mJfkXNYx US CLOUDFLARENET 104.20.68.143 clean
pastebin.com US CLOUDFLARENET 172.67.34.170 mailcious
216.120.201.169 US TRIVALENT-GROUP-NEW 216.120.201.169 mailcious
104.20.68.143 US CLOUDFLARENET 104.20.68.143 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure