ScreenShot
Created 2023.04.26 09:15 Machine s1_win7_x6402
Filename B568.wsf
Type UTF-8 Unicode text, with very long lines, with CRLF, LF line terminators
AI Score Not founds Behavior Score
10.0
ZERO API file : clean
VT API (file)
md5 72c0803e89d617676fbe8bffed241a4a
sha256 05f2d0e3adad33c08e787b62f66d759382650031241ac53b30d88303d061101e
ssdeep 1536:u1k2Zks8SJv/y7VB/T/cH8FzGq3EEQlDhslm5r16gb3NlDewC:u1k2Zks86ngfT/cHUzGKETlDylm5rFbU
imphash
impfuzzy
  Network IP location

Signature (5cnts)

Level Description
watch Network communications indicative of a potential document or script payload download was initiated by the process wscript.exe
watch Wscript.exe initiated network communications indicative of a script based payload download
watch wscript.exe-based dropper (JScript
notice Allocates read-write-execute memory (usually to unpack itself)
info One or more processes crashed

Rules (0cnts)

Level Name Description Collection

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
luzharman.ca US UNIFIEDLAYER-AS-1 192.185.79.75 malware
192.185.79.75 US UNIFIEDLAYER-AS-1 192.185.79.75 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure