ScreenShot
Created 2023.04.26 09:37 Machine s1_win7_x6401
Filename B590.wsf
Type UTF-8 Unicode text, with very long lines, with CRLF, LF line terminators
AI Score Not founds Behavior Score
10.0
ZERO API file : clean
VT API (file)
md5 b589567d30e62fad0a0529662b0207df
sha256 331bef041918c988355e34e614d4f7f2383c2205ea277a0bf6880c055c31b75a
ssdeep 1536:fk2U14hRots7aLUzMmkY9GXAChdjkdWNV1Y3DbOcb:fk2U1kqs+LUxxYdjXVWb1b
imphash
impfuzzy
  Network IP location

Signature (4cnts)

Level Description
watch Network communications indicative of a potential document or script payload download was initiated by the process wscript.exe
watch Wscript.exe initiated network communications indicative of a script based payload download
watch wscript.exe-based dropper (JScript
info One or more processes crashed

Rules (0cnts)

Level Name Description Collection

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
luzharman.ca US UNIFIEDLAYER-AS-1 192.185.79.75 malware
192.185.79.75 US UNIFIEDLAYER-AS-1 192.185.79.75 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure