Report - File_Vbs.vbs

ScreenShot
Created 2023.11.10 09:28 Machine s1_win7_x6403
Filename File_Vbs.vbs
Type Little-endian UTF-16 Unicode text, with very long lines, with CRLF, CR line terminators
AI Score Not founds Behavior Score
2.6
ZERO API file : mailcious
VT API (file) 4 detected (SAgent)
md5 739bf7015a7bb68f0c0452e64497be77
sha256 f9f3d93122f44a521e47daef1ac9126b45f0202c6a988822369ffe4b971592ce
ssdeep 3072:pQlZ3mRQteeeeeYeeeeeVeeeeeMeeeeeLeeeeeYeeeeeleeeeeheeeeeUeeeeeoI:n
imphash
impfuzzy
  Network IP location

Signature (5cnts)

Level Description
watch Attempts to create or modify system certificates
watch Network communications indicative of a potential document or script payload download was initiated by the process wscript.exe
watch Wscript.exe initiated network communications indicative of a script based payload download
notice File has been identified by 4 AntiVirus engines on VirusTotal as malicious
notice Performs some HTTP requests

Rules (0cnts)

Level Name Description Collection

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
https://paste.ee/d/qZWyg US CLOUDFLARENET 172.67.187.200 clean
paste.ee US CLOUDFLARENET 104.21.84.67 mailcious
172.67.187.200 US CLOUDFLARENET 172.67.187.200 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure