top title background image
flash

Ordene 501527,pdf.exe

Status: finished
Submission Time: 2022-08-08 13:21:16 +02:00
Malicious
Trojan
Evader
Spyware
GuLoader, AgentTesla

Comments

Tags

  • exe

Details

  • Analysis ID:
    680367
  • API (Web) ID:
    1047873
  • Analysis Started:
    2022-08-08 13:21:19 +02:00
  • Analysis Finished:
    2022-08-08 13:42:15 +02:00
  • MD5:
    5162b6782f86f1f24e8610544d159ae9
  • SHA1:
    0d1ead84c74ee462976928783c1f733aa859bc94
  • SHA256:
    6730e52c8075c7e044c2bbaf9f7ad8c0f7f8d03fb23adbd2331adc8b591caec7
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 52
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
malicious
Score: 92
System: Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
Run Condition: Suspected Instruction Hammering

IPs

IP Country Detection
69.61.116.42
United States
141.98.6.239
Germany

Domains

Name IP Detection
merian.com.ar
69.61.116.42
mail.merian.com.ar
0.0.0.0

URLs

Name Detection
http://127.0.0.1:HTTP/1.1
https://sectigo.com
https://sectigo.com/CPS0
Click to see the 13 hidden entries
https://api.ipify.org%appdata
https://rwUCPncwlnlg0H1LG.nett-
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
http://DynDns.comDynDNSnamejidpasswordPsi/Psi
http://merian.com.ar
https://api.ipify.org%t-
http://FvewWS.com
https://support.google.com/chrome/?p=plugin_flash
http://nsis.sf.net/NSIS_ErrorError
http://mail.merian.com.ar
http://141.98.6.239/zeaveZtePRlRbWLesj75.dwp
http://141.98.6.239/zeaveZtePRlRbWLesj75.dwplh
https://rwUCPncwlnlg0H1LG.net

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\flex\flex.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\flex.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\nsd84B6.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
#
Click to see the 7 hidden entries
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\FanControlWrapper.dll
PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\Microsoft.Office.Tools.Common.v9.0.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\edit-cut-symbolic.svg
SVG Scalable Vector Graphics image
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Perciform\Selskabelig\Hjemmeopgaven\vrkstedsbygninger\Ricciaceae185.Inc
data
#
C:\Users\user\AppData\Roaming\ec0qfe1f.342\Chrome\Default\Cookies
SQLite 3.x database, last written using SQLite version 3036000
#
C:\Users\user\AppData\Roaming\ec0qfe1f.342\Firefox\Profiles\ol7uiqa8.default-release\cookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3036000
#
\Device\ConDrv
ASCII text, with CRLF line terminators
#