top title background image
flash

07ff580e-3cfd-4c41-a92e-4ba534dd1a0a.lnk

Status: finished
Submission Time: 2023-02-02 08:08:10 +01:00
Malicious
Ransomware
Trojan
Spyware
Evader
RedLine

Comments

Tags

  • lnk

Details

  • Analysis ID:
    796782
  • API (Web) ID:
    1164011
  • Analysis Started:
    2023-02-02 08:08:11 +01:00
  • Analysis Finished:
    2023-02-02 08:20:52 +01:00
  • MD5:
    ef7f9739337bc657cd0a63e32e27d0a1
  • SHA1:
    bf67555a7272f24ceb57b1c49e4cf37dc17b246f
  • SHA256:
    a517abf69af75cef34cc2db14981ea42b2ef4424c140e37363f80badb2353c6c
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 36/61
malicious
Score: 29/39
malicious

IPs

IP Country Detection
185.101.226.22
Spain
194.26.192.248
Netherlands

Domains

Name IP Detection
oiartzunirratia.eus
185.101.226.22
api.ip.sb
0.0.0.0

URLs

Name Detection
https://oiartzunirratia.eus
194.26.192.248:7053
http://194.26.192.248:7053/
Click to see the 42 hidden entries
https://api.ipify.orgcookies//settinString.Removeg
https://oiartzunirratia.eus/install/clean/Lcovlccdxd.exe
http://james.newtonking.com/projects/json
http://tempuri.org/Endpoint/SetEnvironmentResponse
http://tempuri.org/Endpoint/GetUpdates
https://oiartzunirratia.eusx
http://schemas.xmlsoap.org/ws/2004/08/addressing
http://194.26.192.248:70534
http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
http://tempuri.org/Endpoint/GetUpdatesResponse
https://oiartzunirratia.eus/install/clean/Lcovlccdxd.exe0y
https://contoso.com/
https://nuget.org/nuget.exe
https://www.newtonsoft.com/jsonschema
http://tempuri.org/Endpoint/
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
http://tempuri.org/Endpoint/VerifyUpdate
http://tempuri.org/0
https://www.nuget.org/packages/Newtonsoft.Json.Bson
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
http://schemas.xmlsoap.org/soap/actor/next
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
https://ipinfo.io/ip%appdata%
http://nuget.org/NuGet.exe
http://194.26.192.248:7053
http://pesterbdd.com/images/Pester.png
https://api.telegram.org/bot
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
http://tempuri.org/Endpoint/CheckConnectResponse
http://www.apache.org/licenses/LICENSE-2.0.html
https://go.micro
http://tempuri.org/Endpoint/EnvironmentSettings
https://github.com/Pester/Pester
http://oiartzunirratia.eus
https://contoso.com/License
http://schemas.xmlsoap.org/soap/envelope/
https://contoso.com/Icon
http://schemas.xmlsoap.org/soap/envelope/D
http://tempuri.org/
http://tempuri.org/Endpoint/CheckConnect
http://tempuri.org/Endpoint/VerifyUpdateResponse
http://tempuri.org/Endpoint/SetEnvironment

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\Hribpuz\Opgcxhsdw.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Roaming\svhost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\svhost.exe.log
ASCII text, with CRLF line terminators
#
Click to see the 12 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2dl1g21b.4iv.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2tkd4yp5.4vu.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4tbik0zf.2rj.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o0spqkob.y12.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pndsvao1.r4t.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tq0dbqin.drf.ps1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wnsrzb1y.ojp.psm1
very short file (no magic)
#
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xeyz4iyq.hlj.psm1
very short file (no magic)
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\3f5c690594e955e6.customDestinations-ms (copy)
data
#
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\GIDF619N8JJ3AV0K3L7X.temp
data
#