Report - cincocicnnc.vbs

ScreenShot
Created 2023.10.28 19:04 Machine s1_win7_x6401
Filename cincocicnnc.vbs
Type Little-endian UTF-16 Unicode text, with very long lines, with CRLF, CR line terminators
AI Score Not founds Behavior Score
3.0
ZERO API file : clean
VT API (file) 8 detected (gen40, SAgent, AgentTesla, TOPIS, 9qkf2iiUsAC, Eldorado, Detected)
md5 13f5fea2cf9c8eab90170dfda8194c09
sha256 adfaeb4613d63d648ee38acc5c85c2bf21fddc7d45e3781f13db8ba56e2c4048
ssdeep 1536:F+iTxT2e4Mi3mI2hb7KZ18C2NGkikGkFjGkikGkKEt0eEKU+kCKGWGPrbrbTDDp5:Dl2eBQZxNj53e
imphash
impfuzzy
  Network IP location

Signature (6cnts)

Level Description
watch Attempts to create or modify system certificates
watch Network communications indicative of a potential document or script payload download was initiated by the process wscript.exe
watch Wscript.exe initiated network communications indicative of a script based payload download
notice File has been identified by 8 AntiVirus engines on VirusTotal as malicious
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests

Rules (0cnts)

Level Name Description Collection

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
https://paste.ee/d/fHQVm US CLOUDFLARENET 172.67.187.200 clean
paste.ee US CLOUDFLARENET 104.21.84.67 mailcious
172.67.187.200 US CLOUDFLARENET 172.67.187.200 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure