top title background image
flash

VAN NANG TECH-Hàng hóa yêu cầu_order RFQ 2209865.exe

Status: finished
Submission Time: 2022-05-27 15:34:07 +02:00
Malicious
Trojan
Spyware
Evader
AgentTesla

Comments

Tags

  • exe

Details

  • Analysis ID:
    635135
  • API (Web) ID:
    1002639
  • Analysis Started:
    2022-05-27 15:34:08 +02:00
  • Analysis Finished:
    2022-05-27 15:47:46 +02:00
  • MD5:
    9c4dccd93ae4440b5dbc580a85f53b94
  • SHA1:
    c9caa8238fc581ce3504a8513a2e3ee4701e9274
  • SHA256:
    78990521b8fd82b6f0eae446fc6d3f4763764bd85f8820dc7d0a3eeb50d8933b
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 35/68
malicious
Score: 21/26

URLs

Name Detection
https://dsssdsa.fa)Uri
http://127.0.0.1:HTTP/1.1
http://DynDns.comDynDNS
Click to see the 11 hidden entries
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
https://api.telegram.org/bot1338829993:AAGkgJ80sLaIYwBfp79Ps5EtdSP1XH6jBV8/sendDocumentdocument-----
http://sawebservice.red-gate.com/
http://www.smartassembly.com/webservices/Reporting/UploadReport2
https://dsssdsa.fa
http://www.smartassembly.com/webservices/Reporting/
http://kjcOuF.com
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
http://www.smartassembly.com/webservices/UploadReportLogin/
http://www.smartassembly.com/webservices/UploadReportLogin/GetServerURL
https://api.telegram.org/bot1338829993:AAGkgJ80sLaIYwBfp79Ps5EtdSP1XH6jBV8/

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\231\231.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\231\231.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
Click to see the 1 hidden entries
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\231.exe.log
ASCII text, with CRLF line terminators
#