top title background image
flash

SecuriteInfo.com.Win32.DropperX-gen.9148.20800.exe

Status: finished
Submission Time: 2022-11-29 16:49:19 +01:00
Malicious
Trojan
Evader
AveMaria

Comments

Tags

  • exe

Details

  • Analysis ID:
    756122
  • API (Web) ID:
    1123396
  • Analysis Started:
    2022-11-29 16:53:32 +01:00
  • Analysis Finished:
    2022-11-29 17:05:00 +01:00
  • MD5:
    373574c70ab6f299813fdafa9c12ab9b
  • SHA1:
    e6dbfbbe58f87e70da25f5cd31e526ddbceb679e
  • SHA256:
    ad8184627690f50da83d52fa3b92ed2597e279527821ffdede20240d19cc3e21
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 15/40
malicious

IPs

IP Country Detection
188.114.97.3
European Union
188.114.96.3
European Union

Domains

Name IP Detection
filetransfer.io
188.114.96.3
s23.filetransfer.io
188.114.97.3

URLs

Name Detection
62.102.148.158
http://www.microsoft.co
https://s23.filetransfer.io4
Click to see the 21 hidden entries
http://james.newtonking.com/projects/json
https://github.com/Pester/Pester
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
https://github.com/syohex/java-simple-mine-sweeperC:
http://filetransfer.io
https://filetransfer.io/data-package/XK4aNvBX/download
https://www.nuget.org/packages/Newtonsoft.Json.Bson
https://contoso.com/Icon
http://filetransfer.io/data-package/XK4aNvBX/download
https://contoso.com/License
http://nuget.org/NuGet.exe
https://s23.filetransfer.io/storage/download/1tQUp1sCtsBK
https://www.newtonsoft.com/jsonschema
https://nuget.org/nuget.exe
https://contoso.com/
https://go.micro
https://s23.filetransfer.io/storage/download/EmFT04AdCdjg
http://www.apache.org/licenses/LICENSE-2.0.html
http://crl.microsoft
http://pesterbdd.com/images/Pester.png
https://filetransfer.io4

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\Meiilnstlz\Mqombsglp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\Meiilnstlz\Mqombsglp.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
Click to see the 5 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4gpqv23h.beb.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g0etdcxs.mxn.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mhdrfzpc.o2h.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qcybgzu0.gku.psm1
very short file (no magic)
#