MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7a7dfe2d2f86e213819cf5c66a2b4b84c82baccd5dda1e3cb143e165d2ea04a0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ConnectWise


Vendor detections: 13


Intelligence 13 IOCs YARA 6 File information Comments

SHA256 hash: 7a7dfe2d2f86e213819cf5c66a2b4b84c82baccd5dda1e3cb143e165d2ea04a0
SHA3-384 hash: 882014ff46588734407bcb6d8b43817ef61c1cc50a76841d436e46d84fdfc153c14dbdc7e0e31a57d2db208750e38d24
SHA1 hash: ff7563fe2345860e4fd4d9ddd355a7951aa25e9a
MD5 hash: cc2fa5d1e8557b9db21b12766da0a97a
humanhash: mirror-nuts-coffee-vegan
File name:Docx_xlx_2026.vbs
Download: download sample
Signature ConnectWise
File size:15'905 bytes
First seen:2026-02-04 08:57:42 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 192:OAEfbAU/M2uMna8mK/Mg8yv/O/8/AYAs/E/74/7/KdNgVs//H+p/GEk/7/n81j1Q:TEfEV2uMkHysYLoO/aXN
TLSH T18662E712E80795328572523AC61B4C28DB97509320129C26BEDC450FEFB5B8FDAE52EF
Magika vba
Reporter abuse_ch
Tags:ConnectWise vbs

Intelligence


File Origin
# of uploads :
1
# of downloads :
61
Origin country :
SE SE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
92.5%
Tags:
phishing virus shell sage
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
attrib bitsadmin cmd evasive evasive expand lolbin msiexec persistence powershell rundll32 rundll32 runonce timeout wscript
Verdict:
Malicious
Labled as:
HEUR_TrojanDownloader_Script_Generic
Verdict:
Malicious
File Type:
vbs
First seen:
2026-02-02T19:55:00Z UTC
Last seen:
2026-02-04T05:34:00Z UTC
Hits:
~10
Detections:
Trojan-Downloader.JS.SLoad.sb Trojan.JS.SAgent.sb PDM:Trojan.Win32.Generic Trojan-Downloader.Win32.Bitser.sb Trojan.Win32.Agent.sb HEUR:Trojan-Downloader.Script.Generic
Result
Threat name:
ScreenConnect Tool
Detection:
malicious
Classification:
phis.expl.evad
Score:
100 / 100
Signature
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Clears Internet Explorer cache and cookies (likely to cover tracks)
Contains functionality to hide user accounts
Enables network access during safeboot for specific services
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Modifies Internet Explorer zonemap settings
Modifies security policies related information
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Potential evasive JS / VBS script found (domain check)
Potential evasive VBS script found (sleep loop)
Potential malicious VBS script found (has network functionality)
Potential malicious VBS script found (suspicious strings)
Reads the Security eventlog
Reads the System eventlog
Self deletion via cmd or bat file
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Uses cmd line tools excessively to alter registry or file data
VBScript performs obfuscated calls to suspicious functions
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1863112 Sample: Docx_xlx_2026.vbs Startdate: 04/02/2026 Architecture: WINDOWS Score: 100 82 track.manageengine.com 2->82 84 server.tt-ynl.top 2->84 86 6 other IPs or domains 2->86 98 Antivirus detection for URL or domain 2->98 100 Multi AV Scanner detection for dropped file 2->100 102 Multi AV Scanner detection for submitted file 2->102 104 12 other signatures 2->104 8 wscript.exe 5 18 2->8         started        13 msiexec.exe 2->13         started        15 ScreenConnect.ClientService.exe 2->15         started        17 7 other processes 2->17 signatures3 process4 dnsIp5 88 server.tt-ynl.top 104.21.23.17, 443, 49681 CLOUDFLARENETUS United States 8->88 90 zs-us4-lcgiant.manageengine.com 204.141.43.156, 443, 49693 ZOHO-ASUS United States 8->90 66 C:\Windows\Temp\~update_success.txt, ASCII 8->66 dropped 68 C:\Windows\Temp\~pc_PC-XE069.txt, ASCII 8->68 dropped 70 C:\Windows\Temp\~delete_script.bat, DOS 8->70 dropped 72 C:\Windows\...\Windows_Update_202624_410.msi, Composite 8->72 dropped 114 System process connects to network (likely due to code injection or exploit) 8->114 116 VBScript performs obfuscated calls to suspicious functions 8->116 118 Suspicious powershell command line found 8->118 130 9 other signatures 8->130 19 powershell.exe 23 8->19         started        22 rundll32.exe 15 68 8->22         started        24 powershell.exe 15 8->24         started        36 12 other processes 8->36 74 C:\Windows\Installer\MSI93B8.tmp, PE32 13->74 dropped 76 C:\Windows\Installer\MSI900E.tmp, PE32 13->76 dropped 78 C:\Windows\Installer\MSI8C43.tmp, PE32 13->78 dropped 80 10 other files (8 malicious) 13->80 dropped 120 Enables network access during safeboot for specific services 13->120 122 Modifies security policies related information 13->122 26 msiexec.exe 13->26         started        28 msiexec.exe 13->28         started        92 tt-ynl.top 107.178.103.132, 49687, 8041 IOFLOODUS United States 15->92 124 Reads the Security eventlog 15->124 126 Reads the System eventlog 15->126 30 ScreenConnect.WindowsClient.exe 15->30         started        32 ScreenConnect.WindowsClient.exe 15->32         started        94 127.0.0.1 unknown unknown 17->94 128 Changes security center settings (notifications, updates, antivirus, firewall) 17->128 34 MpCmdRun.exe 17->34         started        file6 signatures7 process8 signatures9 106 Loading BitLocker PowerShell Module 19->106 38 conhost.exe 19->38         started        40 WmiPrvSE.exe 19->40         started        108 Clears Internet Explorer cache and cookies (likely to cover tracks) 22->108 42 rundll32.exe 11 77 22->42         started        44 iexplore.exe 4 22->44         started        110 Modifies Internet Explorer zonemap settings 24->110 46 conhost.exe 24->46         started        48 rundll32.exe 26->48         started        112 Contains functionality to hide user accounts 30->112 52 conhost.exe 34->52         started        54 conhost.exe 36->54         started        56 17 other processes 36->56 process10 file11 58 C:\Users\user\...\ScreenConnect.Windows.dll, PE32 48->58 dropped 60 C:\...\ScreenConnect.InstallerActions.dll, PE32 48->60 dropped 62 C:\Users\user\...\ScreenConnect.Core.dll, PE32 48->62 dropped 64 4 other malicious files 48->64 dropped 96 Contains functionality to hide user accounts 48->96 signatures12
Verdict:
Malware
YARA:
2 match(es)
Tags:
ADODB.Stream Batch Command DeObfuscated MSXML2.ServerXMLHTTP.6.0 MSXML2.XMLHTTP.6.0 PowerShell PowerShell Call Scripting.FileSystemObject VBScript WinHttp.WinHttpRequest.5.1 WScript.Network WScript.Shell
Verdict:
Malicious
Threat:
Trojan-Downloader.Win32.SLoad
Threat name:
Script-WScript.Trojan.Znyonm
Status:
Malicious
First seen:
2026-02-03 00:34:00 UTC
File Type:
Text (VBS)
AV detection:
8 of 24 (33.33%)
Threat level:
  5/5
Verdict:
suspicious
Label(s):
admintool_screenconnect
Result
Malware family:
n/a
Score:
  10/10
Tags:
adware backdoor defense_evasion discovery execution persistence privilege_escalation ransomware rat revoked_codesign spyware trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Uses Volume Shadow Copy WMI provider
Uses Volume Shadow Copy service COM API
Views/modifies file attributes
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Boot or Logon Autostart Execution: Authentication Package
Drops file in System32 directory
Adds Run key to start application
Drops desktop.ini file(s)
Enumerates connected drives
Indicator Removal: File Deletion
Checks computer location settings
ConnectWise ScreenConnect remote access tool
Creates new service(s)
Event Triggered Execution: Component Object Model Hijacking
Executes dropped EXE
Loads dropped DLL
Badlisted process makes network request
Binary is signed using a ConnectWise certificate revoked for key compromise.
Command and Scripting Interpreter: PowerShell
Sets service image path in registry
Modifies Windows Defender Real-time Protection settings
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CMD_Ping_Localhost
Rule name:detect_tiny_vbs
Author:daniyyell
Description:Detects tiny VBS delivery technique
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:Suspicious_Process
Author:Security Research Team
Description:Suspicious process creation
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:WIN_ClickFix_Detection
Author:dogsafetyforeverone
Description:Detects ClickFix social engineering technique using 'Verify you are human' messages and malicious PowerShell commands
Reference:ClickFix social engineering and malicious PowerShell commands

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments