Report - runrunlastrun.vbs

Antivirus
ScreenShot
Created 2023.05.19 10:31 Machine s1_win7_x6402
Filename runrunlastrun.vbs
Type ASCII text, with CRLF line terminators
AI Score Not founds Behavior Score
6.4
ZERO API file : clean
VT API (file) 18 detected (ELAT, PowerShell, ai score=89, Wacatac, CLASSIC)
md5 9e2d09f47cc48dd3e84205376a8f9ecb
sha256 9e42c9b206789a24fdf3655af190d1612a1d5a38171cacddbc4fb475d4b56efc
ssdeep 24:1n1WibHAvio4kBkmZoPHmEdqeA50ikCeQxHecoVRRfVPH/UVUMhFEOxWCQjTPiyT:NiZteol5oszFpQZdzFeMcmCB9dFL7rXS
imphash
impfuzzy
  Network IP location

Signature (13cnts)

Level Description
danger The process wscript.exe wrote an executable file to disk which it then attempted to execute
warning Uses WMI to create a new process
watch File has been identified by 18 AntiVirus engines on VirusTotal as malicious
watch Installs itself for autorun at Windows startup
watch One or more non-whitelisted processes were created
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Uses Windows utilities for basic Windows functionality
info Collects information to fingerprint the system (MachineGuid
info Command line console output was observed
info Queries for the computername

Rules (2cnts)

Level Name Description Collection
watch Antivirus Contains references to security software binaries (download)
watch Antivirus Contains references to security software binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure