Report - Cleanup.vbs

Hide_EXE PE File PE32
ScreenShot
Created 2024.08.12 09:53 Machine s1_win7_x6403
Filename Cleanup.vbs
Type ASCII text, with very long lines, with CRLF, LF line terminators
AI Score Not founds Behavior Score
6.2
ZERO API file : malware
VT API (file) 38 detected (Msfvenom, Payload, MPreter, Save, Eldorado, SNIC, Rozena, Dowloader, Malicious, score, fosjzx, Ploty, TOPIS, JqyfiJ1QMlQ, ExpKit, Gen2, Muldrop, Swrort, NJA@833icd, Detected, Gencirc, ai score=82)
md5 afc30ab109d6fa03f5aa7165e732e14f
sha256 556cdf802749030fabd3b0f8fd3291c8e748d664cbb37ddce57226e0f3523dee
ssdeep 192:o83pUi2Yaet9wqP3XOESW54PxKqrkyTMD0lT:b2YaetNHOZXxbkiT
imphash
impfuzzy
  Network IP location

Signature (9cnts)

Level Description
danger The process wscript.exe wrote an executable file to disk which it then attempted to execute
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
danger File has been identified by 38 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Drops a binary and executes it
watch One or more non-whitelisted processes were created
notice A process created a hidden window
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder

Rules (3cnts)

Level Name Description Collection
warning hide_executable_file Hide executable file binaries (upload)
info IsPE32 (no description) binaries (download)
info PE_Header_Zero PE File Signature binaries (download)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
193.117.208.148 GB Virtual1 Limited 193.117.208.148 malware

Suricata ids



Similarity measure (PE file only) - Checking for service failure