ScreenShot
Created 2023.04.26 09:30 Machine s1_win7_x6403
Filename A745.wsf
Type UTF-8 Unicode text, with very long lines, with CRLF, LF line terminators
AI Score Not founds Behavior Score
10.0
ZERO API file : clean
VT API (file)
md5 c10604f2602d7e85e28fa452cd444930
sha256 f2b91029bb46020009833ccc54c5fdb4f54688dec2d1bf815e518339322a1ed7
ssdeep 1536:vN16gjvDRQ/TQiL0itV0o/Bht3rW5D/hgcSMRmnR7Aqo94tPQ+lDhrXvA:vNFjvdQ/P0dahuk/nR7AqJlD5A
imphash
impfuzzy
  Network IP location

Signature (4cnts)

Level Description
watch Network communications indicative of a potential document or script payload download was initiated by the process wscript.exe
watch Wscript.exe initiated network communications indicative of a script based payload download
watch wscript.exe-based dropper (JScript
info One or more processes crashed

Rules (0cnts)

Level Name Description Collection

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
luzharman.ca US UNIFIEDLAYER-AS-1 192.185.79.75 malware
192.185.79.75 US UNIFIEDLAYER-AS-1 192.185.79.75 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure