Adversaries may abuse Visual basic (VB) for execution. VB is a programming language created by Microsoft with interoperability with many Windows technologies such as Component Object Model and the Native API through the Windows API. Although tagged as legacy with no planned future evolutions, VB is integrated and supported in the .NET Framework and cross-platform .NET Core.
Adversaries may use VB payloads to execute malicious commands. Common malicious usage includes automating execution of behaviors with VBScript or embedding VBA content into Spearphishing Attachment payloads.
Here is an Example from a VBScript that Executes on the Machine and Outputs info about the User and the PC, here we have 2 options to execute CSCRIPT and WSCRIPT both work fine but one is a console output and the other is a window output
The user can also Double-Click and have the file execute, it will default to WSCRIPT.