top title background image
flash

SecuriteInfo.com.Win32.DropperX-gen.15139.3101.exe

Status: finished
Submission Time: 2022-11-29 16:49:13 +01:00
Malicious
Trojan
Spyware
Evader
Lokibot

Comments

Tags

  • exe

Details

  • Analysis ID:
    756117
  • API (Web) ID:
    1123393
  • Analysis Started:
    2022-11-29 16:49:18 +01:00
  • Analysis Finished:
    2022-11-29 17:00:05 +01:00
  • MD5:
    3039fa7b347872c33c247581a27a7560
  • SHA1:
    69832bbe446653f7d10eccf07069e73230138af8
  • SHA256:
    f949fda96d4810c4ffa941ecce00160b984cf7ac32cf1ca88dd4dd9583f2e480
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 6/41
malicious

IPs

IP Country Detection
141.98.6.102
Germany

Domains

Name IP Detection
sedesadre.gq
141.98.6.102
l-0003.l-dc-msedge.net
13.107.43.12
onedrive.live.com
0.0.0.0
Click to see the 1 hidden entries
edi4gw.db.files.1drv.com
0.0.0.0

URLs

Name Detection
http://alphastand.top/alien/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.win/alien/fre.php
Click to see the 52 hidden entries
http://alphastand.trade/alien/fre.php
http://sedesadre.gq/PKZ/PWS/fre.php
https://dev.virtualearth.net/mapcontrol/logging.ashx
https://dev.virtualearth.net/REST/v1/Routes/
https://onedrive.live.com/download?cid=9A063D4B0D931024&resid=9A063D4B0D931024
https://contoso.com/Icon
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
https://dev.virtualearth.net/REST/v1/Locations
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
http://www.apache.org/licenses/LICENSE-2.0.html
https://github.com/Pester/Pester
http://james.newtonking.com/projects/json
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
https://dynamic.t
https://dev.virtualearth.net/REST/v1/Routes/Transit
https://www.newtonsoft.com/jsonschema
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
https://www.nuget.org/packages/Newtonsoft.Json.Bson
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
https://dev.ditu.live.com/REST/v1/Locations
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
https://dev.ditu.live.com/REST/v1/Routes/
https://dev.virtualearth.net/REST/v1/Routes/Driving
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
http://www.ibsensoftware.com/
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
https://t0.tiles.ditu.live.com/tiles/gen
https://contoso.com/License
https://dev.virtualearth.net/REST/v1/Routes/Walking
https://onedrive.live.com/download?cid=9A063D4B0D931024&resid=9A063D4B0D931024%21128&authkey=AFWFoMk
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
https://dev.ditu.live.com/mapcontrol/logging.ashx
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
https://go.micro
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
https://contoso.com/
https://nuget.org/nuget.exe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://www.bingmapsportal.com
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
http://nuget.org/NuGet.exe
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
http://pesterbdd.com/images/Pester.png
https://onedrive.live.com
https://edi4gw.db.files.1drv.com4

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.DropperX-gen.15139.3101.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
Click to see the 6 hidden entries
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_150mte30.zn5.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cdh4roqr.3j3.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hojog3ew.0sb.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kk3bso0d.u4o.ps1
very short file (no magic)
#
C:\Users\user\AppData\Roaming\C79A3B\B52B3F.lck
very short file (no magic)
#
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\eb42b1a5c308fc11edf1ddbdd25c8486_d06ed635-68f6-4e9a-955c-4899f5f57b9a
data
#