top title background image
flash

Yêu cầu báo giá INV20230104-VN.exe

Status: finished
Submission Time: 2023-01-05 09:21:09 +01:00
Malicious
Phishing
Trojan
Spyware
Evader
Remcos, AveMaria

Comments

Tags

  • exe

Details

  • Analysis ID:
    778240
  • API (Web) ID:
    1145508
  • Analysis Started:
    2023-01-05 09:21:10 +01:00
  • Analysis Finished:
    2023-01-05 09:36:05 +01:00
  • MD5:
    a07407fce937593044ad512f4a6d7a1e
  • SHA1:
    6fc304eb3856198c1f8b1da8c4a3a52c657274c7
  • SHA256:
    770a25e30c2f095a09570447fd3ab6ecb78de00185d39035a1b87b1d7de89f8c
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 22/72
malicious
Score: 11/40
malicious

IPs

IP Country Detection
194.5.98.244
Netherlands
13.107.43.12
United States
144.76.136.153
Germany
Click to see the 1 hidden entries
178.237.33.50
Netherlands

Domains

Name IP Detection
obologs.work.gd
194.5.98.244
208.168.6.0.in-addr.arpa
0.0.0.0
l-0003.l-dc-msedge.net
13.107.43.12
Click to see the 6 hidden entries
geoplugin.net
178.237.33.50
ip-api.com
208.95.112.1
transfer.sh
144.76.136.153
icanhazip.com
104.18.114.97
kpf0yw.am.files.1drv.com
0.0.0.0
onedrive.live.com
0.0.0.0

URLs

Name Detection
obologs.work.gd
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=1463674
http://crl.pki.goog/gsr2/gsr2.crl0?
Click to see the 97 hidden entries
https://www.google.com/chrome/static/images/thank-you/thankyou-animation.json
https://www.google.com/chrome/static/images/homepage/google-dev.png
https://www.google.com/chrome/static/images/homepage/google-enterprise.png
https://www.google.com/accounts/servicelogin
https://www.google.com/chrome/static/images/fallback/icon-help.jpg
https://contextual.media.net/48/nrrV18753.js
https://contextual.media.net/803288796/fcmain.js?&gdpr=0&cid=8CU157172&cpcd=pC3JHgSCqY8UHihgrvGr0A%3
http://www.msn.com/de-ch/entertainment/_h/c920645c/webcore/externalscripts/oneTrustV2/consent/55a804
https://www.newtonsoft.com/jsonschema
https://www.google.com/chrome/static/images/fallback/icon-twitter.jpg
https://www.google.com/chrome/static/images/fallback/google-logo-one-color.jpg
https://www.google.com/
http://www.fontbureau.com/designers/frere-jones.html
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC828bc1cde9f04b788c98b5423157734
http://www.msn.com/
http://www.carterandcone.coml
https://cvision.media.net/new/300x300/3/167/174/27/39ab3103-8560-4a55-bfc4-401f897cf6f2.jpg?v=9
https://pki.goog/repository/0
https://contextual.media.net/
https://www.google.com/chrome/static/images/homepage/hero-anim-top-right.png
https://transfer.sh/get/3GTNpY/Rtbdyyicls.bmp%Pvdrkkndtbbqxgmhnq
https://kpf0yw.am.files.1drv.com/y4mDTH7qGldoE19yex0JjOdCD7abQr3OT41x7HoVD-gSuwIqkSH1AKWWpBjmzkRc7T3
https://www.google.com/chrome/static/images/app-store-download.png
http://www.nirsoft.net-ms-win-core-delayload-l1-1-0.dll.dlldllD
https://www.google.com/chrome/static/js/main.v2.min.js
https://www.google.com/chrome/static/images/homepage/laptop_desktop.png
https://assets.adobedtm.com/launch-EN7b3d710ac67a4a1195648458258f97dd.min.js
http://www.imvu.com/B
http://www.goodfont.co.kr
https://www.newtonsoft.com/json
http://www.tiro.com
https://geolocation.onetrust.com/cookieconsentpub/v1/geo/location
https://www.google.com/chrome/static/images/favicons/favicon-16x16.png
https://www.google.com/chrome/static/images/homepage/google-canary.png
https://www.google.com/chrome/static/images/chrome_throbber_fast.gif
https://www.google.com/chrome/static/images/google-play-download.png
http://pki.goog/gsr2/GTSGIAG3.crt0)
https://onedrive.live.com/download?cid=B044AF3D48F7B886&resid=B044AF3D48F7B886%21122&authkey=AKVhH87
https://aefd.nelreports.net/api/report?cat=bingth
http://www.fontbureau.com/designers?
http://www.nirsoft.net-ms-win-core-delayload-l1-1-0.dll.dlldll
http://www.founder.com.cn/cn/bThe
http://www.fontbureau.com/designers/?
http://pki.goog/gsr2/GTS1O1.crt0#
http://www.fontbureau.com/designersG
https://www.google.com/chrome/static/images/mac-ico.png
https://www.google.com/chrome/static/images/fallback/icon-fb.jpg
https://onedrive.live.com/download?cid=B044AF3D48F7B886&resid=B044AF3D48F7B886
https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=6856811916691;gtm=
http://www.msn.com/?ocid=iehp
https://maps.windows.com/windows-app-web-link
http://geoplugin.net/json.gp/C
https://www.google.com/chrome/static/images/chrome_safari-behavior.jpg
https://www.google.com/chrome/static/images/homepage/hero-anim-bottom-left.png
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RCc13122162a9a46c3b4cbf05ffccde0f
https://transfer.sh/get/J59PTO/Cuhcxlcg.exe
http://www.founder.com.cn/cn/cThe
https://www.google.com
https://www.google.com/chrome/
http://www.sajatypeworks.com
https://www.google.com/chrome/static/images/download-browser/big_pixel_phone.png
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=68568119166
https://www.google.com/chrome/static/images/homepage/homepage_features.png
https://www.google.com/chrome/static/images/chrome-logo.svg
https://deff.nelreports.net/api/report?cat=msn
http://www.nirsoft.net
http://www.fontbureau.com/designers
http://www.msn.com
https://www.google.com/chrome/static/images/fallback/google-chrome-logo.jpg
http://crl.microsoft
https://www.google.com/chrome/static/css/main.v2.min.css
http://www.imvu.comr
https://www.google.com/chrome/static/images/folder-applications.svg
http://crl.globals
https://kpf0yw.am.files.1drv.com45kT
https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml
https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1
http://pki.goog/gsr2/GTS1O1.crt0
https://www.google.com/chrome/static/images/download-browser/pixel_phone.png
http://www.imvu.com
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC5bdddb231cf54f958a5b6e76e9d8eee
http://www.imvu.com/
https://www.google.com/chrome/static/images/fallback/icon-file-download.jpg
https://www.google.com/chrome/application/x-msdownloadC:
https://www.google.com/chrome/static/css/main.v3.min.css
http://www.msn.com/de-ch/entertainment/_h/c920645c/webcore/externalscripts/oneTrustV2/scripttemplate
https://www.google.com/chrome/static/images/homepage/hero-anim-middle.png
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://www.zhongyicts.com.cn
http://www.nirsoft.net/
http://www.urwpp.deDPlease
https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://c
https://www.google.com/chrome/static/images/icon-announcement.svg
http://www.galapagosdesign.com/DPlease
http://crl.pki.goog/GTS1O1core.crl0
https://srtb.msn.com/auction?a=de-ch&b=a8415ac9f9644a1396bc1648a4599445&c=MSN&d=http%3A%2F%2Fwww.msn
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RCee0d4d5fd4424c8390d703b105f82c3

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\Cuhcxlcg[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\Yqxsvaorwni\Shhejayly.exe:Zone.Identifier
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Yqxsvaorwni\Shhejayly.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 19 hidden entries
C:\Users\user\AppData\Local\Temp\dwn.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Y#U00eau c#U1ea7u b#U00e1o gi#U00e1 INV20230104-VN.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\bhvF833.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x7cd0aa12, page size 32768, DirtyShutdown, Windows version 10.0
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\json[1].json
JSON data
#
C:\Users\user\AppData\Local\Temp\xzhdfxk
Unicode text, UTF-16, little-endian text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\xbsbmhljhlcrmkvfybyknsbrlg
Unicode text, UTF-16, little-endian text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\odqrgxczfqkyvjblz
Unicode text, UTF-16, little-endian text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\jzlrsem
Unicode text, UTF-16, little-endian text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\ixjslbemgsufoiuudk
Unicode text, UTF-16, little-endian text, with no line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Temp\bhv9EB4.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x7cd0aa12, page size 32768, DirtyShutdown, Windows version 10.0
#
C:\Users\user\AppData\Local\Temp\bhv8995.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x7cd0aa12, page size 32768, DirtyShutdown, Windows version 10.0
#
C:\Users\user\AppData\Local\Temp\bhv610E.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x7cd0aa12, page size 32768, DirtyShutdown, Windows version 10.0
#
C:\Users\user\AppData\Local\Temp\bhv424B.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x7cd0aa12, page size 32768, DirtyShutdown, Windows version 10.0
#
C:\Users\user\AppData\Local\Temp\bhv107D.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x7cd0aa12, page size 32768, DirtyShutdown, Windows version 10.0
#
C:\Users\user\AppData\Local\Temp\bbmbgkgdsftq
Unicode text, UTF-16, little-endian text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eq3xehn2.mjn.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dgi0vwrh.uo4.ps1
very short file (no magic)
#